<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
No, Pond senders must authenticate their message with a<br>
recipient-provided secret or the recipient's mailbox will reject it.<br>
See:<br>
<br>
<a href="https://moderncrypto.org/mail-archive/messaging/2014/000409.html" target="_blank">https://moderncrypto.org/mail-archive/messaging/2014/000409.html</a></blockquote><div><br></div><div>Yes, I know. My point is that whilst Pond's current design requires this, it could have a different design and the Pond tech page explicitly says that here:</div>
<div><br></div><div><i><span style="color:rgb(0,0,0);font-family:Elena;font-size:medium;line-height:23.03999900817871px;text-align:justify;background-color:rgb(251,251,252)">(This may be an important weakness. One obvious answer is to have servers accept, say, 10% of a user's quota of unsigned ‘introduction’ messages.)</span></i></div>
<div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div class="">If your use case is "secure key lookup for a well-known journalist", I<br>
</div>
think that's easily solved by the reporter posting his public key, key<br>
fingerprint, and/or SecureDrop/GlobalLeaks hidden-service address on<br>
his HTTPS website, twitter, etc.<br>
<br>
Trusting national passport agencies seems wrong for this use case.</blockquote><div><br></div><div>Now it would be. But I think it's worth remembering that at the start Greenwald was not a well known national security journalist, he was a relatively obscure columnist and blogger. He didn't expect what happened and wasn't using PGP as a result. All different now of course, but it's hard for people to learn PGP, and hard for them to predict they might want to use it. And that in turn means it's hard to bootstrap a secure conversation, as Snowden learned the hard way when he failed to do so.</div>
<div><br></div><div>Usability suffers a lot if asymmetric crypto gets directly exposed to end users. That's why I'm interested in the directory problem. A good key directory (even if the users don't really realise that's what it is) seems like a crucial feature for making it as brainless as possible.</div>
</div></div></div>