slashtechno, to github
@slashtechno@fosstodon.org avatar

I'm unsure if signing my commits is the best idea. When my key expires, commits will show on as unverified. Should I stop signing my commits? I'm aware you can renew keys. However, if you no longer have access to the key, then it can't be renewed.

If a GPG key could no longer be retrieved, all commits signed with that key would appear as unverified, from what I understand.

Perhaps for more visibility? :blobcatshrug:

publicvoit, to orgmode
@publicvoit@graz.social avatar

If you're using with encryption, you need to read https://irreal.org/blog/?p=11827 by about the current issue with 2.4.1.

I noticed the bug myself already in . 😔

In this case, it's good to have still a Debian machine not running the latest versions.

sergio_101, to random
@sergio_101@mastodon.social avatar

Out of curiosity, how many of you use encrypted email?

LiveByReason, to random

Does anyone know if there is any sort of plugin you can enable for mastodon that will attempt to automatically verify signed fediverse posts?

Or if not something right in mastodon server. . . maybe a browser plugin that runs locally? That might even be more secure.

scy, to random German
@scy@chaos.social avatar

Ich hab vorhin mal unter https://pgp.governikus.de/ meinen -Schlüssel "vom Staat™" signieren lassen.

Sie rufen von deinem e-Perso den Namen ab, du lädst deinen Public Key hoch, wählst eine der User-IDs des Keys aus (wenn du mehrere hast), und wenn der Name der UID mit dem Namen auf dem Perso übereinstimmt, bekommst du an die Mailadresse in der UID eine Signatur von 0xA4BF43D7 "Governikus OpenPGP Signaturservice (Neuer Personalausweis)".

Ging schnell und einfach.

[1/2]

mgorny, to rust

I've missed my train (the first time in years!) while debugging the latest issue. This is honestly the single worst piece of software ever written.

They reinvent every single thing and they do it badly. When you try to make it work for everyone (i.e. make it use system resolver and honor proxies), it just falls apart.

I would consider making use , except that discriminates against even more users than GPG bugs do.

https://bugs.gentoo.org/906875

cjerrington, to security
@cjerrington@mstdn.social avatar

After getting my laptop reinstalled, I needed to Migrate my GPG keys to a new machine. Only done this once and thought I should write it down for myself and others.

https://claytonerrington.com/blog/migrating-gpg-keys-to-new-a-machine

freemo, to random
@freemo@qoto.org avatar

Anyone out there with a love for / want to take a look at my website where I explain my PGP keys and see if you can think of anything else useful to add?

Bonus points if everyone has any suggestions of stuff to add that isnt pgp specific as well.

https://jeffreyfreeman.me/contact/

hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

jack, to vim German
@jack@mastodon.sdf.org avatar

Lieber ,

danke für alles ❤️ nicht zuletzt deine gelebte Toleranz gegen meine Emacs-Affinität. (und vieles andere) will never be the same without you.

http://www.guckes.net/sven/

https://www.linuxwochen.at/in-memoriam-sven-guckes

Cheatha, to random German
@Cheatha@chaos.social avatar

Grund 1337 warum ich / nicht leiden kann:

  • Ich habe für jeden Dienst eine eigene Mailadresse. »Verliert« ein Dienst meine Mailadresse, weiß ich, wo die Daten leckten
  • Will ich mit so einem Dienst per GPG kommunizieren, muss ich diese Mailadresse meinem Key hinzufügen
  • Um GPG annähernd bequem nutzen zu können, muss mein Key auf nen Keyserver

Spammer so: Geil, so viele Mailadressen!

¯_(ツ)_/¯

blueghost, to email
@blueghost@mastodon.online avatar

Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.

Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.

Instructions: https://proton.me/support/how-to-use-pgp
GnuPG: https://mastodon.online/@blueghost/111974048270035570

Website: https://proton.me
Mastodon: @protonprivacy

#Proton #ProtonMail #ProtonPrivacy #OpenPGP #PGP #GnuPG #GPG #Email #Encryption #E2EE #InfoSec #Privacy

ablackcatstail, to random

Cryptography came to my rescue today. Thank you ! When I had suspicions that a coworker wanted to get me fired I signed a document with my private key. When she summarily accused me of an alteration she made, revealed that she made the alteration and not me. The infosec officer and HR escorted her out. . I love being underestimated.

oliklee, (edited ) to ubuntu
@oliklee@chaos.social avatar

I have upgraded two systems to 24.04 now and also tried as snap (which is the default for Ubuntu 24.04) on another machine.

The system upgrades were incredibly smooth. Thunderbird in general also works fine, but it doesn't support with private keys on a yet (which is my usecase). (Yes,there is a workaround, although clunky.)

So it looks like I'll stay on 23.10 a bit longer on my main machine.

https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/2009825

hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.0.1 of the new crate https://crates.io/crates/openpgp-card-state

This crate paves the way for convenient handling of card User PINs, for users whose threat model allows persisting the PIN locally on the host computer.

If a User PIN is stored, applications can obtain it via this crate, and perform cryptographic operations without prompting the user for PIN entry.

Currently org.freedesktop.Secret is supported for storage.

Thoughts are welcome!

stafwag, to debian
@stafwag@mastodon.social avatar

Use a GPG smartcard with Thunderbird. Part 1: setup GnuPG

https://stafwag.github.io/blog/blog/2024/04/21/use-a-gpg-smartcard-with-thunderbird-part_1-setup-gpg/

I moved to a Thinkpad w541 with coreboot so I needed to set up my email encryption on Thunderbird again.

It took me more time to reconfigure it again - as usual - so I decided to take notes this time and create a blog post about it. As this might be useful for somebody else … or me in the future :-)

#debian #email #gpg #gnupg #linux #pgp #security #thunderbird

#stafwag @stafwag

ptlawrence, to random

I cannot thank @benjaminhollon enough for reigniting my love of the terminal. And poetry. But as far as the terminal goes, he introduced me to , , , via BorgBase, . Did I leave anything out? Oh, and PCs, which are environmentally friendly.

Maybe one day I'll be able to repay you.

kikobar, to random
@kikobar@acc4e.com avatar

@jwildeboer I have been using S/MIME with since at least 2015.

Many of the reasons described in the forum are true, which does not mean S/MIME is impossible to fix or use.

There is native support for S/MIME in many email clients both desktop and mobile/tablet, including most of the 'stock' clients installed by default in most of the devices, so this is not an issue.

I think the big problems are basically 2:

1.- Having a throwaway key and certificate every 30 days (as we do with Letsencrypt SSL/TLS) is very inconvenient because we would need to keep a long collection of them in order access old messages.

2.- People access their email from multiple devices, so syncing the private key securely across all of them becomes a challenge.

For the tech savvy, both problems are manageable:

1.- You can get a free S/MIME certificate from valid for 1 year here:

https://www.actalis.com/s-mime-certificates.aspx


Please read a very important reply to this post by @duxsco pointing out to the insecurity of the Actalis certificate, and providing a secure but not free alternative.


2.- You can manually add this certificate to all your devices and keep an encrypted/secure repository with all your old keys and certificates in case you need to access your archived email.

I've been doing exactly that for years and it is just fine for signing my email.

IMHO for 'fixing' the whole signing and encryption of emails, is conceptually closer to be a more consistent solution, and I use it with everyone who understands it, but I have to admit that the ecosystems is far less ready than for S/MIME (you will need to use specialised apps or installed plugins, etc.), Thunderbird being a shining exception.

PGP has several very powerful advantages:

1.- You don't need a CA for the sole purpose of generating your keys.

2.- You can use the same keys for many years.

3.- People who really trust each other can sign each other's keys creating a web-of-trust.

4.- There is a free network of keyservers where you can upload your public keys and make them available to everyone.

5.- Most people these days have their own website, blog or social media account where they can publish their public keys for cases when they distrust the public servers. They can manually exchange them too.

In the long run I believe we should promote the adoption of OpenPGP instead of S/MIME, with more people using it, native support should follow.

I am not an expert though, so I'd love to hear from others too. 😊

slink, to email
@slink@fosstodon.org avatar
todd_a_jacobs, to iOS
@todd_a_jacobs@ruby.social avatar

This is more of a security question, but I currently know way more people on ruby.social than infosec.exchange. I want to use a for or signing on & , but can't find:

  1. Any documentation about how to integrate it with Apple Mail.

  2. Anyplace that offers certificates for S/MIME at zero or minimal cost the way @letsencrypt offers free certs.

Self-signed S/MIME certs are a non-starter, and there are no full-featured apps on iOS. Suggestions?

kubikpixel, (edited ) to Bulgaria German
@kubikpixel@chaos.social avatar

«Ende-zu-Ende-Verschlüsselung (E2EE) durch Urteil EU-weit geschützt»
@tarnkappeinfo

Mal eine positive Nachricht was die und angeht. Die ist geschützt und eingesehen das wichtig ist. Jetzt müssen nur noch die Firmen und Behörden die ihrer , wie zB mit , noch konsequent umsetzen. Ich hoffe, die zieht dem nach.

🔐 https://tarnkappe.info/artikel/netzpolitik/ende-zu-ende-verschluesselung-durch-urteil-eu-weit-geschuetzt-289301.html
🔐 https://gnupg.org

scy, to github
@scy@chaos.social avatar

I think it's telling that #GitHub, #GitLab, and even #Forgejo all don't have a workflow for "renew an #OpenPGP key", i.e. extend its validity before (or after) expiry. On all of them, you have to delete and re-add the key. It's as if nobody is following OpenPGP best practices and everyone is using keys without an expiry date.

#GPG #GnuPG

freemo, to security
@freemo@qoto.org avatar

It was a very very long weekend preparing Yubikeys with pgp keys.

sergio_101, to random
@sergio_101@mastodon.social avatar

Everyone talks about Bob sending Alice an encrypted message but never asks how scandalous it is.

mjgardner, to Facebook

Disappointed to receive this message from team:

notification are going away on December 5. This means that, soon, emails you receive from Facebook will no longer be encrypted.

If you have previously set up a , you can still view it under settings on Facebook (or in the Accounts Center under Password and security) until December 5.

/cc @GnuPG @protonmail

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • cubers
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • osvaldo12
  • ngwrru68w68
  • GTA5RPClips
  • provamag3
  • InstantRegret
  • everett
  • Durango
  • cisconetworking
  • khanakhh
  • ethstaker
  • tester
  • anitta
  • Leos
  • normalnudes
  • modclub
  • megavids
  • lostlight
  • All magazines