- dering of long encrypted threads. It also allows the user to
- destroy the secret part of any expired encryption-capable subkey
- while still being able to read any retained messages for which they
- have stashed the session key. This enables truly deletable e-mail,
- since (once the session key and asymmetric subkey are both
- destroyed) there are no keys left that can be used to decrypt any
- copy of the original message previously stored by an adversary.
+ dering of long encrypted threads. It also allows the user to de‐
+ stroy the secret part of any expired encryption-capable subkey while
+ still being able to read any retained messages for which they have
+ stashed the session key. This enables truly deletable e-mail, since
+ (once the session key and asymmetric subkey are both destroyed)
+ there are no keys left that can be used to decrypt any copy of the
+ original message previously stored by an adversary.