framapiaf.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Un service Mastodon fourni par l'association d’éducation populaire Framasoft.

Administré par :

Statistiques du serveur :

1,4K
comptes actifs

#openpgp

4 messages3 participants0 message aujourd’hui
daltux"The <b>treta</b> has been planted."<br><br>@ :debian: Sid<br><br><pre>apt-listchanges: News<br>---------------------<br><br>gnupg2 (2.4.7-4) experimental; urgency=medium<br><br> The upstream GnuPG project now explicitly and deliberately diverges from<br> the OpenPGP standard. Debian's own workflows rely heavily on OpenPGP,<br> and we ship several different OpenPGP implementations, so<br> interoperability via standardization is a priority for the project.<br><br> While Debian still has significant dependencies on GnuPG, the version of<br> GnuPG shipped in Debian will default to emitting only OpenPGP-compatible<br> artifacts if at all possible. As of 2.4.7-4, the default<br> is --compliance=openpgp, and we apply several patches to ensure that<br> this mode is respected.<br><br> If you observe GnuPG in Debian emitting a non-OpenPGP artifact in a<br> scenario where a standard OpenPGP artifact is intended or expected,<br> please open a critical bug report in the Debian BTS.<br><br> If you want Debian's GnuPG to emit non-standardized artifacts, in line<br> with upstream's deliberate divergence, you can explicitly pass<br> --compliance=gnupg (or set the corresponding option in<br> ~/.gnupg/gpg.conf). If you revert to compliance with upstream defaults,<br> do not expect the material you produce to be interoperable with other<br> OpenPGP implementations.<br><br> -- Daniel Kahn Gillmor &lt;dkg@fifthhorseman.net&gt; Fri, 07 Feb 2025 23:35:29 -0500<br></pre><a href="https://snac.daltux.net?t=debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Debian</a> <a href="https://snac.daltux.net?t=gnupg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#GnuPG</a> <a href="https://snac.daltux.net?t=gpg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#GPG</a> <a href="https://snac.daltux.net?t=openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenPGP</a> <a href="https://snac.daltux.net?t=gnu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#GNU</a><br>
Delta Chat<p>Some of you may have heard of <a href="https://chaos.social/tags/simplex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>simplex</span></a> which likes to elevate itself as "the first messenger without user-ids" ... a goal, similar to ours, of not letting the transport layer know about who talks. Only we are doing it in the email system, fully interoperable with tens of thousands of existing email servers and other <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a> endpoints. The email system is much more than SMTP/IMAP or even openpgp btw ... there is plenty of room for radical shifts and new takes. We are just starting :)</p>
Delta Chat<p><a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a> traditions and <a href="https://chaos.social/tags/signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>signal</span></a> both bind a cleartext identifier, phone number or email address, to a cryptographic key. It opens up attack vectors as the servers/orgs controlling this binding can interfere.</p><p><a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deltachat</span></a> avoids such cleartext identity bindings by creating random <a href="https://chaos.social/tags/chatmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chatmail</span></a> addresses, as transport only. The cryptographic key becomes the identifier and we want it hidden from the transport layer. Only people being in end-to-end encrypted chat need to identify each other, after all.</p>
Karl Voit :emacs: :orgmode:<p>If you need <a href="https://graz.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> via <a href="https://graz.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a>, the only 2 valid standards are <a href="https://graz.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> and <a href="https://graz.social/tags/SMIME" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMIME</span></a>. </p><p>It's not that those are without issues but everything else is mediocre.</p><p>Yes, you can switch to non-email-services as well such as <a href="https://graz.social/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a>. But that's a different island.</p><p><a href="https://graz.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://graz.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://graz.social/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> <a href="https://graz.social/tags/GMail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GMail</span></a></p>
Debacle<p><span class="h-card" translate="no"><a href="https://social.screamingatmyscreen.com/@fallenhitokiri" class="u-url mention">@<span>fallenhitokiri</span></a></span> </p><p>Most people seem to believe <a href="https://framapiaf.org/tags/email" class="mention hashtag" rel="tag">#<span>email</span></a> were just a misspelling of gmail anyway 🤷</p><p><a href="https://framapiaf.org/tags/mu4e" class="mention hashtag" rel="tag">#<span>mu4e</span></a> <a href="https://framapiaf.org/tags/OpenPGP" class="mention hashtag" rel="tag">#<span>OpenPGP</span></a> <a href="https://framapiaf.org/tags/encryption" class="mention hashtag" rel="tag">#<span>encryption</span></a> <a href="https://framapiaf.org/tags/e2ee" class="mention hashtag" rel="tag">#<span>e2ee</span></a></p>
Ivan GJ<p><strong>Delta Chat es demasiado buena 🔥</strong></p> <p><a href="https://fediverse.tv/videos/watch/21b54e75-f8ae-4a61-919c-a7d264f67b57" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fediverse.tv/videos/watch/21b5</span><span class="invisible">4e75-f8ae-4a61-919c-a7d264f67b57</span></a></p>
Preston Maness ☭<p><span class="h-card" translate="no"><a href="https://mastodon.ml/@Xeniax" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Xeniax</span></a></span> Totally nerdsniped :D I'd love to be a part of the study.</p><p>I don't think that <a href="https://tenforward.social/tags/KeyServers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyServers</span></a> are dead. I think they evolved into Verifying Key Servers (VKS), like the one run by a few folks from the OpenPGP ecosystem at <a href="https://keys.openpgp.org/about" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">keys.openpgp.org/about</span><span class="invisible"></span></a> . More generally, I believe that <a href="https://tenforward.social/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a> / <a href="https://tenforward.social/tags/GPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG</span></a> / <a href="https://tenforward.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> retains important use-cases where accountability is prioritized, as contrasted with ecosystems (like <a href="https://tenforward.social/tags/Matrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Matrix</span></a>, <a href="https://tenforward.social/tags/SignalMessenger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SignalMessenger</span></a>) where deniability (and Perfect Forward Secrecy generally) is prioritized. Further, PGP can still serve to bootstrap those other ecosystems by way of signature notations (see the <a href="https://tenforward.social/tags/KeyOxide" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyOxide</span></a> project).</p><p>Ultimately, the needs of asynchronous and synchronous cryptographic systems are, at certain design points, mutually exclusive (in my amateur estimation, anyway). I don't think that implies that email encryption is somehow a dead-end or pointless. Email merely, by virtue of being an asynchronous protocol, cannot meaningfully offer PFS (or can it? Some smart people over at crypto.stackexchange.com seem to think there might be papers floating around that can get at it: <a href="https://crypto.stackexchange.com/questions/9268/is-asynchronous-perfect-forward-secrecy-possible" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">crypto.stackexchange.com/quest</span><span class="invisible">ions/9268/is-asynchronous-perfect-forward-secrecy-possible</span></a>).</p><p>To me, the killer feature of PGP is actually not encryption per se. It's certification, signatures, and authentication/authorization. I'm more concerned with "so-and-so definitely said/attested to this" than "i need to keep what so-and-so said strictly private/confidential forever and ever." What smaller countries like Croatia have done with <a href="https://tenforward.social/tags/PKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKI</span></a> leaves me green with envy.</p>
l<p><span class="h-card" translate="no"><a href="https://mastodon.social/@eff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eff</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@evacide" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>evacide</span></a></span> <br>GnuPG is not the only way to encrypt email, I use <a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> with Thunderbird and <span class="h-card" translate="no"><a href="https://chaos.social/@delta" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>delta</span></a></span>, both don't use GPG.</p><p>Also pages<br><a href="https://ssd.eff.org/module/how-use-pgp-linux" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ssd.eff.org/module/how-use-pgp</span><span class="invisible">-linux</span></a><br>and<br><a href="https://ssd.eff.org/module/how-use-pgp-windows" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ssd.eff.org/module/how-use-pgp</span><span class="invisible">-windows</span></a><br>are outdated, Thunderbird now has built-in OpenPGP implementation and Enigmail does not work with the latest versions.</p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>»Gmail Gets End-To-End Encryption From Google As 21'st Birthday Present:<br>[…] Google Claims To Have Invented An Entirely New Type Of Encryption For Gmail Users […]«</p><p>This is not an April joke and yes Google offers OpenPGP for Gmail Accounts. This is not difficult to set up but too many people are too lazy in my opinion.</p><p>📧 <a href="https://www.forbes.com/sites/daveywinder/2025/04/01/gmail-gets-end-to-end-encryption-from-google-as-21st-birthday-present/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/daveywinder/2</span><span class="invisible">025/04/01/gmail-gets-end-to-end-encryption-from-google-as-21st-birthday-present/</span></a></p><p><a href="https://chaos.social/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a> <a href="https://chaos.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://chaos.social/tags/gmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gmail</span></a> <a href="https://chaos.social/tags/mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mail</span></a> <a href="https://chaos.social/tags/itsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsec</span></a> <a href="https://chaos.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://chaos.social/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://chaos.social/tags/april" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>april</span></a> <a href="https://chaos.social/tags/endtoendencryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endtoendencryption</span></a> <a href="https://chaos.social/tags/pgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pgp</span></a> <a href="https://chaos.social/tags/joke" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>joke</span></a> <a href="https://chaos.social/tags/birthday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>birthday</span></a> <a href="https://chaos.social/tags/nojoke" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nojoke</span></a> <a href="https://chaos.social/tags/april" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>april</span></a> <a href="https://chaos.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
StefanEs werden ja immer wieder neue Schlüssel zur Kommunikation erstellt. Diese müssten ja auch irgendwann auslaufen / ausgetauscht werden. D.h. wenn der Client länger nicht online war, bekommt man keine neue Schlüssel mehr. Ich denke, dass dies dann ein paar Probleme machen wird.<br><br>Beispiel: Dein Computer geht kaputt. Es dauert ein paar Tage bis du einen neuen besorgt hast und diesen wieder eingerichtet hast. In der Zeit hast du aber einige Nachrichten bekommen. Man hat zwar ein Backup, aber vielleicht nicht gerade ein tägliches. Mit <a href="https://devlug.de/social?t=openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenPGP</a> via <a href="https://devlug.de/social?t=xmpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#XMPP</a> müsste man sich keinen Kopf machen. Die Nachricht kann man ohne Probleme lesen. Bei PFS könnte dies komplexer werden.<br><br>Wenn Personen mehrere Geräte haben, dann haben diese Person auch mehrere Schlüsseln. Das kann dann zu einem kleinen Schlüssel Chaos führen. Es wird für den normalen User ggf. auf die Verwendung von "Blind Trust" hinauslaufen.<br><br>Mal ein Beispiel, welches ich so nicht haben, mir aber vorstellen könnte.<br>Man verwendet ein Theam-Chat. Vielleicht auch ein Chat mit Kunden. Der Chef selber ist zwar nicht im Chat oder vielleicht nicht immer alle Kollegen. Allerdings sollten bestimmte Personen im Fall von Krankheit / Urlaub Zugriff haben können. Das stelle ich mir mit PFS auch schwerer vor. Bei OpenPGP ist es bestimmt einfacher.<br><br>CC: <span class="h-card"><a href="https://freie-re.de/users/qbi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@qbi@freie-re.de</a></span> <span class="h-card"><a href="https://gruene.social/users/Gerbsen" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@Gerbsen@gruene.social</a></span> <span class="h-card"><a href="https://osna.social/users/ber" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@ber@osna.social</a></span><br>
profanityMore information about <a href="https://devlug.de/social?t=openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenPGP</a> for <a href="https://devlug.de/social?t=xmpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#XMPP</a> (<a href="https://devlug.de/social?t=ox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OX</a>) in <a href="https://devlug.de/social?t=profanity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#profanity</a>: <code>man 1 profanity-ox-setup</code>.<br><br><a href="https://devlug.de/social?t=gnupg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#GnuPG</a><br><br>CC: <span class="h-card"><a href="https://social.mdosch.de/martin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@martin@social.mdosch.de</a></span> <span class="h-card"><a href="https://mathstodon.xyz/users/caten" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@caten@mathstodon.xyz</a></span> <span class="h-card"><a href="https://mastodon.social/users/Goffi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@Goffi@mastodon.social</a></span> <span class="h-card"><a href="https://fosstodon.org/users/gajim" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@gajim@fosstodon.org</a></span><br>
vanitasvitae<p>Just figured out, that the massive performance hit my <a href="https://fosstodon.org/tags/PGPainless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGPainless</span></a> test suite was suffering since I started to port to a newer BC version was caused by the default S2K iteration count being bumped to 0xff instead of 0x60.<br>This had caused the runtime of the test suite to rise to 7 minutes compared to ~1 minute.</p><p>I decided to dial down the default value again, but make it customizable :D</p><p><a href="https://fosstodon.org/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a></p>
Delta Chat<p>We are not aware of other FOSS development teams that have as extensive knowledge, both theoretical and practical, about <a href="https://chaos.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> and <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a> and regularly release across all platforms for users world wide ... except for <a href="https://chaos.social/tags/protonmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protonmail</span></a> with whose technical and security experts we discuss regularly. They are the other major game in town doing pervasive email encryption after all. Did you know that Proton's and delta's VCards are compatible across ecosystems and establish immediate encryption?</p>
Delta Chat<p><span class="h-card" translate="no"><a href="https://jura.social/@mathilde" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mathilde</span></a></span> <a href="https://chaos.social/tags/chatmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chatmail</span></a> server users don't have these problems because they don't even need to know their password or email address. Messages in delta chat are stored locally and the server only stores them for a limited time, up to 20 days by default, so all devices have a chance to download the message. Blocklists are also not used, the only requirements are <a href="https://chaos.social/tags/DKIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DKIM</span></a> signature and <a href="https://chaos.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> encryption.</p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GnuPG</span></a> 2.5.5 (dev) has been released (<a href="https://mastodon.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> / <a href="https://mastodon.social/tags/GPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG</span></a> / <a href="https://mastodon.social/tags/GNUPrivacyGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNUPrivacyGuard</span></a> / <a href="https://mastodon.social/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a> / <a href="https://mastodon.social/tags/PrettyGoodPrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrettyGoodPrivacy</span></a> / <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> / <a href="https://mastodon.social/tags/Gpg4win" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gpg4win</span></a>) <a href="https://gnupg.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gnupg.org/</span><span class="invisible"></span></a></p>
Anthony Accioly<p>My latest "Bringing PGP to the 21st Century" update:<br>I’ve set up WKD for all my "public-facing" identities, with both direct and advanced methods working across the relevant domains. I’ve also uploaded all my keys to Keybase, OpenPGP, and Ubuntu keyservers. I even even generated a QR code with the openPGP4FPR URI scheme: <a href="https://openpgpkey.accioly.social/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">openpgpkey.accioly.social/</span><span class="invisible"></span></a></p><p>PGP experts, am I missing anything?</p><p><a href="https://accioly.social/tags/WKD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WKD</span></a> <a href="https://accioly.social/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a> <a href="https://accioly.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> <a href="https://accioly.social/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmailSecurity</span></a> <a href="https://accioly.social/tags/DigitalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalSecurity</span></a> <a href="https://accioly.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://accioly.social/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a></p>
Delta Chat<p>The downside of our project approach was that we often got experts being very dismissive on re-using email and <a href="https://chaos.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> ... and there still is some opposition which often subsides when actually trying <a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deltachat</span></a> and <a href="https://chaos.social/tags/chatmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chatmail</span></a>, looking at security audits and our strong usable security focus. </p><p>There may also be surprising upsides. The UK "Online Safety Bill" which attacks end-to-end encryption integrity seems to not apply for ... e-mail. Because everyone knows, e-mail is unencrypted, right? :)</p>
Pirate Praveen<p>Has anyone here on <a href="https://social.masto.host/tags/fedi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedi</span></a> figured out the correct recipe for dealing with <a href="https://social.masto.host/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a>, <a href="https://social.masto.host/tags/DMARC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMARC</span></a> and <a href="https://social.masto.host/tags/mailman" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailman</span></a> ?</p><p>The problem, by default mailman will modify messages and this will break the dkim signature.<br><a href="https://gitlab.com/mailman/mailman/-/issues/1079" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.com/mailman/mailman/-/i</span><span class="invisible">ssues/1079</span></a></p><p>Mailman provides two DMARC mitigation options (other option is reject or discard which is not useful in this case).</p><p>1. Replace the from address with list address<br>2. Wrap original message in an envelope</p><p>thunderbird flags 1 and fails 2.<br><a href="https://social.masto.host/tags/askfedi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>askfedi</span></a> <a href="https://social.masto.host/tags/gnupg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnupg</span></a> <a href="https://social.masto.host/tags/gpg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gpg</span></a> <a href="https://social.masto.host/tags/thunderbird" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thunderbird</span></a></p>
Em :official_verified:<p>New Privacy Guides article 🔑✨<br>by me: </p><p>If you are using a YubiKey, </p><p>you might get in some situations where you need to reset your key to factory default, and/or set up a backup of it on a spare key.</p><p>This tutorial will guide you <br>through each step to reset and back up your YubiKey successfully, with clear instructions and plenty of visual support.</p><p>I hope you find it helpful!</p><p><a href="https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">privacyguides.org/articles/202</span><span class="invisible">5/03/06/yubikey-reset-and-backup/</span></a></p><p><a href="https://infosec.exchange/tags/PrivacyGuides" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyGuides</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Yubico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yubico</span></a> <a href="https://infosec.exchange/tags/YubiKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YubiKey</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/OTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTP</span></a> <a href="https://infosec.exchange/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> <a href="https://infosec.exchange/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a></p>
Lars Wirzenius<p>I've made release 0.3.0 of sopass, my command line password manager that uses a Stateless OpenPGP implementation for cryptography.</p><p>* configuration file<br>* add value from named file or stdin<br>* default to rsop<br>* manual page, built-in help</p><p><a href="https://sopass.liw.fi/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sopass.liw.fi/</span><span class="invisible"></span></a></p><p><a href="https://toot.liw.fi/tags/sopass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sopass</span></a> <a href="https://toot.liw.fi/tags/pass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pass</span></a> <a href="https://toot.liw.fi/tags/passwordManager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwordManager</span></a> <a href="https://toot.liw.fi/tags/commandLine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commandLine</span></a> <a href="https://toot.liw.fi/tags/cli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cli</span></a> <a href="https://toot.liw.fi/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a> <a href="https://toot.liw.fi/tags/statelessOpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>statelessOpenPGP</span></a> <a href="https://toot.liw.fi/tags/sop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sop</span></a></p>