hko, to rust
@hko@fosstodon.org avatar

The oct tool for inspecting, configuring and using OpenPGP card devices (https://crates.io/crates/openpgp-card-tools) is on "This Week in Rust":

https://this-week-in-rust.org/blog/2024/02/21/this-week-in-rust-535/#projecttooling-updates

Yay! 🎉 Thanks again, @dvzrv 😀

hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.0.1 of the new crate https://crates.io/crates/openpgp-card-state

This crate paves the way for convenient handling of card User PINs, for users whose threat model allows persisting the PIN locally on the host computer.

If a User PIN is stored, applications can obtain it via this crate, and perform cryptographic operations without prompting the user for PIN entry.

Currently org.freedesktop.Secret is supported for storage.

Thoughts are welcome!

hko,
@hko@fosstodon.org avatar

To illustrate the use of openpgp-card-state, here's an early version of an ssh-agent implementation that uses it:

https://codeberg.org/openpgp-card/ssh-agent/src/branch/state

This SSH agent explores an absolutely streamlined UX for doing ssh backed by OpenPGP card-based key material.

After persisting the User PIN once, like this: "$ openpgp-card-state put --user-pin 123456 0000:01234567", the ssh agent can be used without any user interaction.

hko, to random
@hko@fosstodon.org avatar

We just released version 0.10.0 of https://crates.io/crates/openpgp-card-tools, a tool for inspecting, configuring and using cards.

This release renames the CLI tool "opgpcard" to the much shorter "oct". New features include:

  • Support for signature generation in detached, inline and cleartext forms
  • Support for PIN presentation with cards in KDF mode
  • Support for file-based private key unlocking (thanks @jcgruenhage)

Thanks to @NGIZero for financial support and @dvzrv for another great collaboration.

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.4.2 of the https://crates.io/crates/openpgp-card low level library, and version 0.2.1 of the https://crates.io/crates/openpgp-card-sequoia wrapper.

These releases add support for cards that are configured to use "KDF mode" for PIN presentation.

Thanks to the reporters in: https://codeberg.org/openpgp-card/openpgp-card-tools/issues/43 (and to Gniibe for providing me some insights into KDF-use in Gnuk).

nwalfield, to random
@nwalfield@mastodon.social avatar

My talk "Sequoia PGP: Rethinking OpenPGP Tooling" including an Ode to Werner (@DD9JN) and (@GnuPG) has been released. I'm happy to receive constructive feedback, both positive and negative! https://fosdem.org/2024/schedule/event/fosdem-2024-3297-sequoia-pgp-rethinking-openpgp-tooling/

blueghost, to email
@blueghost@mastodon.online avatar

Thunderbird is an email client with built-in support for PGP encryption.

Messages are encrypted/decrypted in the client and remain encrypted on email servers, this is client-side encryption.

Some email providers support PGP encryption server-side, this method could be vulnerable to third-party decryption of emails.

PGP: https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Client side encryption: https://en.wikipedia.org/wiki/Client-side_encryption

Website: https://www.thunderbird.net
Mastodon: @thunderbird

kaiengert, to security
@kaiengert@mastodon.social avatar

I gave a talk at .

Video and slides are now available:
https://fosdem.org/2024/schedule/event/fosdem-2024-2849--security-thunderbird-email-security-plans-and-challenges-/

I'm interested in your feedback on these thoughts. Either here, or, if your feedback is longer, for a discussion it might be best to post to
https://thunderbird.topicbox.com/groups/e2ee

Thanks a lot to the organizers of @fosdem and the modern email developer room.
https://github.com/modern-email/FOSDEM-24?tab=readme-ov-file#contact

hko, to random
@hko@fosstodon.org avatar

Having decidedly too much fun playing with ancient artifacts.

Note the two version 2 public keys from 1992. They were created just over a year after Phil Zimmermann first released PGP (on 6 June 1991), deep in the crypto war era.

These keys predate the name by around half a decade.

At over 31 years old, nation-state actors can definitely factor John Gilmore's RSA 1024 key today.
However, I believe the cost still exceeds a hobbyist budget even now.

freemo, to security
@freemo@qoto.org avatar

It was a very very long weekend preparing Yubikeys with pgp keys.

todd_a_jacobs, to iOS
@todd_a_jacobs@ruby.social avatar

This is more of a security question, but I currently know way more people on ruby.social than infosec.exchange. I want to use a for or signing on & , but can't find:

  1. Any documentation about how to integrate it with Apple Mail.

  2. Anyplace that offers certificates for S/MIME at zero or minimal cost the way @letsencrypt offers free certs.

Self-signed S/MIME certs are a non-starter, and there are no full-featured apps on iOS. Suggestions?

kushal,
@kushal@toots.dgplug.org avatar

@todd_a_jacobs @letsencrypt Sorry for not writing in full, I was trying to say that tool will help you to use your key on an .

The @letsencrypt handle was on the reply as I clicked the reply button on the elk.zone frontend.

kushal, to python
@kushal@toots.dgplug.org avatar

Find me on and say Hi, in case you want to chat about @torproject

inpector, to random German
@inpector@social.saarland avatar

unterstützt nicht das standardmäßige Signieren von Mails, weil's von fraglicher Nutzung ist !? Da bleibt wohl nur für mich jetzt wo ich mal die Nerven hatte meinen PGP-Key wieder sauber zu gestalten.

https://github.com/thunderbird/thunderbird-android/issues/2734

thunderbird, (edited ) to privacy
@thunderbird@mastodon.online avatar

[EDIT: It's not explicitly stated, but it can be inferred that Bitwarden is asking about email providers and not clients. Thanks for pointing it out! Leaving this post up, though, because it's a solid survey.]

Thunderbird friends! @bitwarden has a short survey asking about your preferred stack -- but they didn't include Thunderbird in the question about email...

Do us a favor, and when you get to Question 2, click "other" and type in Thunderbird! 💙

https://forms.bitwarden.com/privacy

~JDE

drathir,

@bitwarden @thunderbird kind of shame at @bitwarden not place one from most noticeable and oldest email clients around which now supports and ;/

DM_Ronin, to privacy
@DM_Ronin@mstdn.social avatar

Wow - apparently WhatsApp's design allows to gather information on which devices the client is installed, and Meta said it's all by design https://m.opnxng.com/@TalBeerySec/hi-meta-whatsapp-with-privacy-6d646c5aa3bc

Reminds me of a story back in 2017, when a flaw in encryption was found in WA and they replied with "it's not a bug, it's a feature" - and in response, my friends and I decided to add PGP encryption to WA Web as a hackathon project :blobfoxlaugh:

#Privacy #Security #Messenger #WhatsApp #Meta #Facebook #E2EE #Encryption #OpenPGP #PGP

bogo, to random
@bogo@hapyyr.com avatar

I rely on for my email communication. That is why I generate my OpenPGP keys with their key manager, not through the gpg itself.

This morning, I set up my Web Key Directory () so anyone with an email client that supports this can auto-discover my public key without needing to look at any key server or rely on information from my website.

https://dev.to/bogomil/how-to-use-your-thunderbird-generated-openpgp-key-to-set-your-web-key-directorywkd-5ffj

eighthave, to debian

Just migrated my #offline #gnupg and #ssh key setup to a new #smartcard. This only took about 8 hours whereas when I last did this in 2015, it took much longer. I guess this is a sign of process! But these things are still too painful. At least now, the software just works right out of #Debian.

hko,
@hko@fosstodon.org avatar

@eighthave FWIW, I wrote a simple/stateless CLI tool to provision and inspect #OpenPGP card devices:

https://codeberg.org/openpgp-card/openpgp-card-tools

I personally find it much easier to use than #GnuPG to import key material onto cards.

However, as far as I know, no efforts to package the tool for #Debian exist so far.

The tool is, however, packaged for #Arch Linux, #NixOS, and #Void Linux.

With all of that said: Totally agreed! These tasks are way harder than they should be, and I also hope for more progress.

kaiengert, to random
@kaiengert@mastodon.social avatar

If you use , and you would like to ensure interoperability with Thunderbird, you might consider to disable the use of features, by using option --rfc4880 in your configuration (e.g. by adding a line with the word "rfc4880" to your gpg.conf file.)
At this time it is undecided whether future Thunderbird versions will support LibrePGP or the upcoming refresh of the specification, or both, or none of them. Hopefully we'll eventually see a new universal standard.

hko, to random
@hko@fosstodon.org avatar

I've just released version 0.4.1 of the https://crates.io/crates/openpgp-card low level library.

This release fixes setting key slot creation times to values with trailing zero bytes (that is, unix time <2^24).

Thanks @ryan for finding and fixing this! 😃

hko, (edited ) to random
@hko@fosstodon.org avatar

Here's looking forward to a good new year in , with an easier learning curve for newcomers, as well as progress on the standard and interoperability.

kaiengert, to random
@kaiengert@mastodon.social avatar

I posted thoughts on
"Privacy when refreshing or looking up keys" here:
https://lists.hostpoint.ch/hyperkitty/list/openpgp-email@enigmail.net/thread/3H3FZYYWUAARTDVORFUTJ2TFKKNWMK4G/

The very long post points to an experimental onion service.

Feedback welcome.

Motivation: We need to implement this ability in , and I'm trying to find an appropriate approach.

jwildeboer, to random German
@jwildeboer@social.wildeboer.net avatar

#NFC geeks/nerds: where can I buy NFC cards with a #ST25TA64K chip? It seems that is the chip with the biggest storage available? Or do you know of other standard type 4 tags with 8kB or more?

kkarhan,
@kkarhan@mstdn.social avatar

@jwildeboer @rena2019 @mwfc And that doesn't even account for a decently sized to go along with it and a for all said data!

paulox, to random
@paulox@fosstodon.org avatar

During the migration work to the new PC I found this guide by Jordan Williams on backing up and restoring OpenPGP keys using Gnu Privacy Guard (also known as GnuPG and GPG) useful 🎉

https://www.jwillikers.com/backup-and-restore-a-gpg-key

#PGP #OpenPGP #GnuPG #GPG #Keys #Backup #Restore

kkarhan, to chat German
@kkarhan@mstdn.social avatar

A little personal post I should propably pin:

Don't sent me any links/invites to , / or whatever sites/services.

I WILL IGNORE THEM!

If you want to contact me, you'll find all the info you want on my profile.

To protect against , all messages/eMails get automatically filtered as junk on server-side.

If you want a reply, add your to those.

Thanks for your attention!

kkarhan,
@kkarhan@mstdn.social avatar

@eatyourglory no, but that's due to and them being shitty to devs.
There are / /MIME implementations for tho...

https://www.openpgp.org/software/#ios

  • All
  • Subscribed
  • Moderated
  • Favorites
  • tester
  • osvaldo12
  • magazineikmin
  • cubers
  • thenastyranch
  • normalnudes
  • Youngstown
  • ngwrru68w68
  • slotface
  • mdbf
  • rosin
  • InstantRegret
  • kavyap
  • DreamBathrooms
  • JUstTest
  • khanakhh
  • anitta
  • modclub
  • Leos
  • everett
  • ethstaker
  • Durango
  • GTA5RPClips
  • provamag3
  • megavids
  • tacticalgear
  • cisconetworking
  • lostlight
  • All magazines