Groklaw shuts down over fears of email snooping

Not to mention, of course, that GPG requires

  • both parties to use it, not just the one who is knowledgeable and concerned about privacy
  • both parties to authenticate one another’s public keys offline (or through their web of mutually trusted GPG users. hm. hmhmsneRT. hmhmfffhahahHAHAHAHA. Ha. Hoo, boy)