glacasa, to random French
@glacasa@dotnet.social avatar

Proton Mail versus Tuta (Tutanota) encryption

https://proton.me/blog/proton-vs-tuta-encryption

« encrypted “emails” within Tuta, which cannot extend beyond their walled garden, are not really emails at all: they are encrypted messages using a proprietary format »

thunderbird, to opensource
@thunderbird@mastodon.online avatar

We've got a Thunderbird for Android "Two for Tuesday!" Play two songs from your favorite band while you read our latest progress report (https://blog.thunderbird.net/2023/12/thunderbird-for-android-k-9-mail-november-december-2023-progress-report/). There's lots of news, updates, and community contributions to end 2023!

While we hoped to release Thunderbird for Android by now, we realized you deserve the best mobile e-mail we can give you. Read about our decision to let the newest Thunderbird take its time to hatch:
https://blog.thunderbird.net/2023/12/when-will-thunderbird-for-android-be-released/

cryptgoat,
@cryptgoat@digitalcourage.social avatar

@thunderbird Better to take some more time to prepare a proper release – looking forward to it and kudos for keeping Thunderbird on @fdroidorg.

Still, any news about future encryption options, especially via ? Pretty much all email clients rely on to manage all your keys. Sadly it is still unmaintained and desperately needs a replacement or someone to take over development. Look at issues like this: https://github.com/open-keychain/open-keychain/issues/2856
for Android will also rely on this unmaintained app.

jbzfn, to opensource
@jbzfn@mastodon.social avatar

🔐 A schism in the OpenPGP world | @LWN

「 The major implementers of the OpenPGP standard as specified by RFC-4880 came together and agreed that the planned updates of the IETF to RFC-4880 are harmful for the existing deployment of OpenPGP software. The majority of its users are expecting long-term stability and a real world focus instead of disruptive changes as recently been proposed [by] the IETF OpenPGP working group#Cybersecurity 」

https://lwn.net/SubscriberLink/953797/7222cd75661fb888/

dvzrv, to security
@dvzrv@chaos.social avatar

Really happy with how the @sovtechfund funded "OpenPGP for application developers" turned out! 🎉

The is now live (also available as ):
https://openpgp.dev/book/

Thanks for the great collaboration @MsUppity, @vanitasvitae, @hko, @wiktor and Sabrina. 🥳
Hope to do some more!

I learnt a lot over the past few months. 📚

vanitasvitae, to random German
@vanitasvitae@fosstodon.org avatar

/me is now co-author :D

I'm proud to present "OpenPGP for Application Developers" on which we worked for the past 3 months as a team of 6.

Thanks for @sovtechfund for sponsoring the work and thanks to @hko @MsUppity @dvzrv, @wiktor and Sabrina for the pleasant collaboration!

hko, to security
@hko@fosstodon.org avatar

1/ 🎉 Big news in the world! Our team's labor of love, "OpenPGP for Application Developers," is now live! Check it out: https://openpgp.dev/. 🚀📚 Our mission? Make OpenPGP accessible, enjoyable, and a go-to tool for devs!

hko,
@hko@fosstodon.org avatar

4/ 📣 Join us in refining and expanding “OpenPGP for Application Developers”! Open-source at heart! Developed on https://codeberg.org/openpgp/notes/ and shared under CC-BY-SA-4.0. We'd love your insights! Let's collaborate and grow the ecosystem together!

hko, to security
@hko@fosstodon.org avatar

Exciting news for enthusiasts and learners! 🚀 "OpenPGP for Application Developers" is now live! 📘 Whether you're a seasoned pro or just starting, learn the best ways to add OpenPGP into your development toolkit. 🌐🔐

Discover the essential guide at https://openpgp.dev/.

GnuPG, to random

is an alternative, updated specification of the encryption standard.

Implementations like RNP (used by Thunderbird) and GnuPG (the crypto engine in Gpg4win) have working code in their implementations since 2018.

Read up on the different focus that https://librepgp.org/ sets for updating .

adulau, to privacy

Following funky usage of OpenPGP, I found a user using GitHub gist to send encrypted messages. The keyid is the correlation value from an AIL project instance.

publicvoit, to orgmode
@publicvoit@graz.social avatar

If you're using with encryption, you need to read https://irreal.org/blog/?p=11827 by about the current issue with 2.4.1.

I noticed the bug myself already in . 😔

In this case, it's good to have still a Debian machine not running the latest versions.

publicvoit,
@publicvoit@graz.social avatar

@tzz @galdor @nickanderson I think I agree with the -only restriction.

However, in my case, I'm using my setup also for email workflows and file encryption outside of Emacs. With that, I do have some advantages when using only one encryption keyring from .

YMMV

If there would be an Emacs-specific alternative, I'd still switch to it I guess. (Depends on the implementation details.)

pgpkeys, to random

The project leader of has announced a fork of the standard, justifying it with a list of accusations against the working group that fall apart under scrutiny. is being threatened with destruction over a personal grievance. We strongly urge de-escalation.

https://blog.pgpkeys.eu/critique-critique

governa, to random
@governa@fosstodon.org avatar

A Critique on “A Critique on the Updates”

https://blog.pgpkeys.eu/critique-critique.html

adulau, to opensource

It seems my old blog post from 2016 about OpenPGP - « OpenPGP really works » still stands the current discussions.

https://www.foo.be/2016/12/OpenPGP-really-works

dvzrv, to random
@dvzrv@chaos.social avatar

When it comes to recent developments in the space, I can highly recommend this read:
https://blog.pgpkeys.eu/critique-critique

kaiengert, to random
@kaiengert@mastodon.social avatar

Just some random AI created image visualizing email encryption. needs some positive vibes these days...

blueghost, to opensource
@blueghost@mastodon.online avatar

LibreOffice supports symmetric and asymmetric encryption for OpenDocument Format (ODF) files.

Symmetric encryption: https://en.wikipedia.org/wiki/Symmetric-key_algorithm
Asymmetric encryption: https://en.wikipedia.org/wiki/Public-key_cryptography

Select File > Save/Save As

The "Save with password" option encrypts the file with AES-256.
The "Encrypt with GPG key" option encrypts the file with a public key.

Website: https://www.libreoffice.org
Mastodon: @libreoffice

hko, to random
@hko@fosstodon.org avatar

13-12 is coming.

hko, (edited ) to linux
@hko@fosstodon.org avatar
pgpkeys, to random

The pgpkeys.eu test swarm (a set of four containerised hockeypuck keyservers) is now running the hockeypuck 2.2 development branch, to test eventual consistency. Waiting to see if they will stabilise overnight. 🤞

Hockeypuck 2.2 will include several updates:

  • drop support for deprecated algorithms (and therefore sync compatibility with sks-keyserver)
  • drop support for images
  • delete UIDs from hard-revoked keys
  • implement timestamp-aware merge strayegy
  • experimental support for v5 and v6 keys

Dropping sks-keyserver backwards compatibility should get rid of several long-running sync issues. Hockeypuck validates self-sigs but sks-keyserver does not, and maintaining sync consistency with sks-keyserver means storing and propagating unverifiable self-sigs made with unsupported algorithms (in particular elGamal/RSA encrypt-and-sign, which are long deprecated). This has never worked reliably, and sks-keyserver compatibility is no longer a priority for the keyserver operators. Removing this support also significantly simplifies the code.

Dropping support for images will reduce the storage footprint of a keyserver, and will eliminate an obvious abuse vector.

Hard (i.e. retrospective) revocation of a key (e.g. by publishing the revocation certificate saved at key generation time) will cause all User IDs attached to that key to be deleted. This allows key owners to remove their personal information from the entire keyserver network without having to contact individual operators (which can still be done, your rights are not affected).

The timestamp-aware merge strategy will allow key owners to remove spammy third-party signatures from their published key by creating a fresh self-signature (e.g. by updating the expiry date) and republishing. This works similarly to attestation signatures, but is compatible with clients that don’t yet support attestations.

v5 (GnuPG) and v6 (RFC9760?) signatures will soon start appearing in the wild. Several changes will need to be made in the codebase to enable support to be added in the future.

These vital developments will help keep the keyserver network stable, relevant, and compliant, into the foreseeable future.

esm, to random
@esm@wetdry.world avatar

I THINK THE MATRIX CHAT PROTOCOL SUCKS

kkarhan,
@kkarhan@mstdn.social avatar

@hexaheximal @esm @hexaheximal @protonmail I do work on getting that part fixed...
https://github.com/KBtechnologies/PocketCrypto

In the meantime, learn / (/MIME) and/or +...

Tools like make it even easier to do so...
https://github.com/life4/enc

Just like and on Desktops or on ...

mjgardner, to Facebook

Disappointed to receive this message from team:

notification are going away on December 5. This means that, soon, emails you receive from Facebook will no longer be encrypted.

If you have previously set up a , you can still view it under settings on Facebook (or in the Accounts Center under Password and security) until December 5.

/cc @GnuPG @protonmail

legoktm, to rust
@legoktm@wikis.world avatar

I haven't been very good with posting/writing about what I'm working on, so here's a 1,200+ word post about how we replaced[1] the GPG code backed by a library aptly called "pretty-bad-protocol" with a Rust library named after trees, Sequoia-OpenPGP.

This is the first written-here Rust code that will be shipped by SecureDrop \o/

https://securedrop.org/news/migrating-securedrops-pgp-backend-from-gnupg-to-sequoia/

[1] okay technically we didn't replace p-b-p entirely, but largely sidelined it

LiveByReason, to random

Does anyone know if there is any sort of plugin you can enable for mastodon that will attempt to automatically verify signed fediverse posts?

Or if not something right in mastodon server. . . maybe a browser plugin that runs locally? That might even be more secure.

sequoiapgp, to random
@sequoiapgp@mastodon.social avatar

We released version 1.17.0 of sequoia-openpgp! It includes new fuzzing infrastructure, a secret key leak detector, and integration with sequoia git, which enforces a signing policy. Read our release announcement for more details.

https://lists.sequoia-pgp.org/hyperkitty/list/announce@lists.sequoia-pgp.org/thread/5NUEKGYXVEIEBZF2XRQHMLAOYDSSKOSQ/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • provamag3
  • InstantRegret
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ethstaker
  • osvaldo12
  • modclub
  • normalnudes
  • anitta
  • tester
  • megavids
  • Leos
  • lostlight
  • All magazines