How can we ensure the best practice with mail pgp when the recipient is not using it?

How can we ensure the best practice with mail pgp when the recipient is not using it?, so when Bob send the vary first email to Alex, Bob signing and encrypted it?

Q1. In that case, Is Alex able to read the message? With signing and encrypting the mail, how doe those two steps help Bob in the first place comparing to just address, content to alex@example.com?

Found this question, but not sure what exactly we need to do

How do we ‘initiate’ mail exchange with PGP

Continue reading How can we ensure the best practice with mail pgp when the recipient is not using it?

What’s the shortest message you need to claim ownership of another message?

Hypothetically, I’d like to demonstrate that I am the owner of a piece of published information. The requirements are the following.

The hash/ characteristic string is compact enough (ideally a few bytes, say 16 or 32.)
It does not expose… Continue reading What’s the shortest message you need to claim ownership of another message?