protonmail, to random
@protonmail@mastodon.social avatar

Standardized, interoperable is key for a better internet.

Proton and the @ietf OpenPGP Working Group are pleased to announce a crypto refresh of the standard. Standardization today ensures interoperability tomorrow.

More here ➡️ https://proton.me/blog/openpgp-crypto-refresh.

kaiengert, to random
@kaiengert@mastodon.social avatar

Hello community of users. I'd like to know if some of you are still stuck at Thunderbird version 68 and the old Add-on. Is there any missing functionality in Thunderbird 115 that is still preventing you from migrating? @thunderbird

kaiengert, to security
@kaiengert@mastodon.social avatar

I gave a talk at .

Video and slides are now available:
https://fosdem.org/2024/schedule/event/fosdem-2024-2849--security-thunderbird-email-security-plans-and-challenges-/

I'm interested in your feedback on these thoughts. Either here, or, if your feedback is longer, for a discussion it might be best to post to
https://thunderbird.topicbox.com/groups/e2ee

Thanks a lot to the organizers of @fosdem and the modern email developer room.
https://github.com/modern-email/FOSDEM-24?tab=readme-ov-file#contact

muro, to linux

Das #BSI beglaubigt #OpenPGP Schlüssel von Privatpersonen mit dem Online fähigen #Personalausweis.

https://pgp.governikus.de/pgp

Ich hab es gestern ausprobiert. Die #AusweisApp2 für den Desktop konnte ich mir unter #Ubuntu mit #flatpak ganz leicht installieren. Das Smartphone braucht #NFC und die App aus dem #fdroid store.

Jetzt den public key bereithalten, denn nach 2-3 Klicks wird man danach gefragt.

Einen Moment später hätte ich meinen signierten Schlüssel in einer Mail. 😃

kaiengert, to random
@kaiengert@mastodon.social avatar

We have a new passphrase protection feature in Daily (development) builds, in response to requests we received in the past. Here's a description and call for testing:
https://thunderbird.topicbox.com/groups/e2ee/Tdc427a8b0255b85a/passphrase-protection-for-openpgp-secret-keys
I'd welcome some testing and feedback.

GPGTools, to macos

🔒 macOS Sonoma + GPG Mail

Apple has dropped support for macOS Mail plugins, such as GPG Mail, in macOS Sonoma. If you rely on our OpenPGP integration for your daily work, please refrain from upgrading to macOS Sonoma at this time. As a replacement Apple introduced "Mail Extensions". For GPG Mail however, some very important functionality is still missing from the Mail Extensions API which will not be available before the first update of .

Learn more: https://gpgtools.com/sonoma

legoktm, to rust
@legoktm@wikis.world avatar

I haven't been very good with posting/writing about what I'm working on, so here's a 1,200+ word post about how we replaced[1] the GPG code backed by a library aptly called "pretty-bad-protocol" with a Rust library named after trees, Sequoia-OpenPGP.

This is the first written-here Rust code that will be shipped by SecureDrop \o/

https://securedrop.org/news/migrating-securedrops-pgp-backend-from-gnupg-to-sequoia/

[1] okay technically we didn't replace p-b-p entirely, but largely sidelined it

blueghost, to opensource
@blueghost@mastodon.online avatar

LibreOffice supports symmetric and asymmetric encryption for OpenDocument Format (ODF) files.

Symmetric encryption: https://en.wikipedia.org/wiki/Symmetric-key_algorithm
Asymmetric encryption: https://en.wikipedia.org/wiki/Public-key_cryptography

Select File > Save/Save As

The "Save with password" option encrypts the file with AES-256.
The "Encrypt with GPG key" option encrypts the file with a public key.

Website: https://www.libreoffice.org
Mastodon: @libreoffice

decathorpe, to random
@decathorpe@mastodon.social avatar
  1. I pushed another update for (version 1.16.0), which fixes a handful of parser bugs that could result in crashes caused by out-of-bounds array accesses. All affected applications were rebuilt with the new version. 🕶️

This also included the latest version of sequoia-octopus-librnp, which provides better compatibility with recent versions of .

Updating sequoia-sq to the latest version is still blocked, because some of the new dependencies have blocking issues 😐

vanitasvitae, to random German
@vanitasvitae@fosstodon.org avatar

/me is now co-author :D

I'm proud to present "OpenPGP for Application Developers" on which we worked for the past 3 months as a team of 6.

Thanks for @sovtechfund for sponsoring the work and thanks to @hko @MsUppity @dvzrv, @wiktor and Sabrina for the pleasant collaboration!

kushal, to programming
@kushal@toots.dgplug.org avatar
blueghost, to email
@blueghost@mastodon.online avatar

Thunderbird is an email client with built-in support for PGP encryption.

Messages are encrypted/decrypted in the client and remain encrypted on email servers, this is client-side encryption.

Some email providers support PGP encryption server-side, this method could be vulnerable to third-party decryption of emails.

PGP: https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Client side encryption: https://en.wikipedia.org/wiki/Client-side_encryption

Website: https://www.thunderbird.net
Mastodon: @thunderbird

9to5linux, to opensource
@9to5linux@floss.social avatar
stv0g, to random German
@stv0g@chaos.social avatar

I updated my crowd-sourced list of , , and , security tokens:

https://l.0l.de/tokens

Feel free to have a look if you are in the market for a new security token :-) Contributions and feedback are highly welcome :)

pgpkeys, to random

The project leader of has announced a fork of the standard, justifying it with a list of accusations against the working group that fall apart under scrutiny. is being threatened with destruction over a personal grievance. We strongly urge de-escalation.

https://blog.pgpkeys.eu/critique-critique

kaiengert, to random
@kaiengert@mastodon.social avatar

I posted thoughts on
"Privacy when refreshing or looking up keys" here:
https://lists.hostpoint.ch/hyperkitty/list/openpgp-email@enigmail.net/thread/3H3FZYYWUAARTDVORFUTJ2TFKKNWMK4G/

The very long post points to an experimental onion service.

Feedback welcome.

Motivation: We need to implement this ability in , and I'm trying to find an appropriate approach.

kushal, to python
@kushal@toots.dgplug.org avatar

Find me on and say Hi, in case you want to chat about @torproject

cjerrington, to security
@cjerrington@mstdn.social avatar

After getting my laptop reinstalled, I needed to Migrate my GPG keys to a new machine. Only done this once and thought I should write it down for myself and others.

https://claytonerrington.com/blog/migrating-gpg-keys-to-new-a-machine

hko, (edited ) to rust
@hko@fosstodon.org avatar

In the past few weeks, I spent a bit of time on a set of hobby projects around (https://github.com/rpgp/rpgp/). Today I'm happy to announce:

rsop v0.1.0 (https://crates.io/crates/rsop), an early stage "stateless OpenPGP" tool based on rpgp.

Relatedly, I also released rpgpie 🦀️🔐🥧 v0.0.1 (https://crates.io/crates/rpgpie), an experimental high level OpenPGP API based on rpgp (rsop is built on top of rpgpie).

delta, to rust
@delta@chaos.social avatar

News from the machine room: the pure end-to-end encryption engine, "rpgp", saw quite some work and a new release in recent weeks and now @hko released a higher level "rpgpie" interface for application developers ( see https://fosstodon.org/@hko/111997998005869515 ) which also powers running the IETF test suite quite successfully .... Delta Chat's security-audited encryption engine is in fact used from several other projects and in other contexts these days and we are happy about it!

183231bcb, to random

Can anymany tell me how I'm "supposed" to use end-to-end encryption with XMPP?

As far as I can tell there are three totally different ways to do E2EE:

a)OTR : "[https://xmpp.org/extensions/xep-0364.html](Not intended to be a current standard), or technical specification, as better (albeit, newer and less well tested) methods of end-to-end encryption exist for XMPP. "

b)OpenPGP: There are at least two different XEPs about it. XEP-0027 is obsolete, while XEP-0373 is "experimental" but hasn't been updated in almost three years.

c)OMEMO: "Experimental" and hasn't been updated in over two years.

Is there a way to do E2EE in XMPP which is neither deprecated nor experimental? What's the "Current stable" way to do it?

janvlug, to linuxphones
@janvlug@mastodon.social avatar
hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

dvzrv,
@dvzrv@chaos.social avatar
hko, to random
@hko@fosstodon.org avatar

30 years ago today, 2.6 was released via MIT.

Up to this point, two major issues had been unresolved: The legal status of the use of RSA in PGP, and export of the software from the US to the rest of the world.

With the release of PGP 2.6, the first of these two issues was resolved.

The pre-history of , , is hard to imagine, today. Even though variations of the https://en.m.wikipedia.org/wiki/Crypto_Wars remain a (tiringly) recurring political battle ground, three decades later.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • tacticalgear
  • DreamBathrooms
  • osvaldo12
  • mdbf
  • everett
  • magazineikmin
  • khanakhh
  • Youngstown
  • rosin
  • slotface
  • modclub
  • kavyap
  • tester
  • JUstTest
  • ngwrru68w68
  • thenastyranch
  • cisconetworking
  • Durango
  • ethstaker
  • InstantRegret
  • normalnudes
  • Leos
  • GTA5RPClips
  • megavids
  • cubers
  • anitta
  • lostlight
  • All magazines