Hiker, to random

Jetzt mal eine wirklich sehr nerdige .
Für diejenigen, die E-Mail-Verschlüsselung mit / verwenden:
Lässt ihr die Betreffzeile offen oder wird die bei euch auch verschlüsselt?

hko, (edited ) to random
@hko@fosstodon.org avatar

I just released version 0.9.5 of the opgpcard CLI tool (https://crates.io/crates/openpgp-card-tools), now with manpage generation and generation of shell completions (work by @dvzrv, thanks! 🥳)

nono2357, to random
kushal, to python
@kushal@toots.dgplug.org avatar

Too many developers go all in for NIH syndrome (https://en.wikipedia.org/wiki/Not_invented_here ), may be I will write a blog post tomorrow on the latest example.

hko, to random
@hko@fosstodon.org avatar

I just released version 0.1.7 of the simple experimental standalone agent for cards: https://crates.io/crates/openpgp-card-ssh-agent/.

This release is a port to the current version of the openpgp-card library (see https://fosstodon.org/@hko/111015349793980056), and also includes an update of the dependencies in Cargo.lock.

GPGTools, to macos

🔒 macOS Sonoma + GPG Mail

Apple has dropped support for macOS Mail plugins, such as GPG Mail, in macOS Sonoma. If you rely on our OpenPGP integration for your daily work, please refrain from upgrading to macOS Sonoma at this time. As a replacement Apple introduced "Mail Extensions". For GPG Mail however, some very important functionality is still missing from the Mail Extensions API which will not be available before the first update of .

Learn more: https://gpgtools.com/sonoma

jabberati, to Meme
@jabberati@social.anoxinon.de avatar

A friend just sent me this. #xmpp #meme

debacle,
@debacle@framapiaf.org avatar

@jabberati

That's why I prefer #OX 🐂 (#OpenPGP for #XMPP) over #OMEMO. PFS? No thanks!

#Jabber

cjerrington, to security
@cjerrington@mstdn.social avatar

After getting my laptop reinstalled, I needed to Migrate my GPG keys to a new machine. Only done this once and thought I should write it down for myself and others.

https://claytonerrington.com/blog/migrating-gpg-keys-to-new-a-machine

protonmail, to random
@protonmail@mastodon.social avatar

Standardized, interoperable is key for a better internet.

Proton and the @ietf OpenPGP Working Group are pleased to announce a crypto refresh of the standard. Standardization today ensures interoperability tomorrow.

More here ➡️ https://proton.me/blog/openpgp-crypto-refresh.

gerowen, to security
@gerowen@mastodon.social avatar

This is the way forward for and email ; not proprietary or stand alone walled gardens. Kudos to the folks over at @protonmail .

"Modernizing and improving PGP security"

https://proton.me/blog/openpgp-crypto-refresh

lued, to linux
@lued@troet.cafe avatar

EN:
Unfortunately, I can't find a good entry point for this topic:
How do you implement server-side mail encryption and decryption for s/mime? I use Postfix+Cyrus.

DE:
Ich finde für das Thema leider keinen guten Einstieg:
Wie realisiert ihr serverseitige Mailver- und entschlüsselung für s/mime? Ich nutze Postfix+Cyrus.

kkarhan,
@kkarhan@mstdn.social avatar

@lued Das ist ja der Trick:
Das geht garnicht, jedenfalls nicht offiziell.

Es gibt ne Menge Appliances die quasi als Man-in-the-Middle agieren um dies umzusetzen aber IMHO ist das allenfalls Blenderei wenn nicht sogar digitales Schlangenöl.

Es ist einfacher allen Nutzer*innen beizubringen wie / funktioniert als das zu realisieren...

Sonst gäb's keine |s...

@cryptoparty

efi, to random
@efi@chitter.xyz avatar

all of the fedidrama with blocklists comes down to the idea that instances are needed for proxying traffic, but this is only true because identities are not decentralized, which is a fundamental mistake of the mastodon era of software
this is not really up to debate
without decentralized identity we will have this problem of someone else deciding what data we have access to, so if you don't like that, you have to push for it, the same way mastodon pushed for the democratization of this centralized model away from twitter, and even before mastodon others did so in a less accessible way
give power to the users by making it accessible, not by pretending that everyone can learn to use docker

kkarhan,
@kkarhan@mstdn.social avatar

@efi That would require people to learn how to use #Keyoxide, #GnuPG / #OpenPGP and #SelfHost their shit which - lets be honest - nobody but the most #TechLiterate do.

And sadly we can't ban #TechIlliterates from using #Tech or the #Internet...

aruiz, to random

"But Bitcoin is a great way to monetize excess renewables"

No, this was never true. If you make a capital investment in a mining rig, then you want that rig making you money 24hrs, not just when the rest of the grid is not consuming renewables.

You become a baseload leech.

Bitcoin must die.

https://social.platypush.tech/@blacklight/111028903112151981

kkarhan,
@kkarhan@mstdn.social avatar

@asei_sano @aruiz : :bitcoin: just like are indefensible and both and can only be meaningfully used for Capital Flight by rich oligarchs that don't have easier tools for !

That's why :monero: is superior in every metric you can throw at it!
https://mstdn.social/@kkarhan/111104696515870820

And no, your comparison is bad as doesn't have to suck - not even with proper* (like )!

  • which necessitates self-custody of keys.
hko, (edited ) to random
@hko@fosstodon.org avatar

I've just released new versions of the openpgp-card family of libraries (https://gitlab.com/openpgp-card/openpgp-card/).

These releases bring a number of breaking changes, but come with many improvements, including a cleaned up and better documented high-level API in openpgp-card-sequoia (https://docs.rs/openpgp-card-sequoia/0.2.0/openpgp_card_sequoia/struct.Card.html).

The releases fix some issues, and build on a new, more generalized card-backend, crate.

Thanks to @NGIZero for supporting this work!

hko,
@hko@fosstodon.org avatar

Among many other improvements, I've added a mechanism for backend crates to adjust capabilities based on reader limitations. For example, this can be used to disable extended length APDUs, if the reader doesn't support them.

With this new mechanism, I saw stable support for cards via a (cheap and easy to source) ACR122U reader, using card-backend-pcsc v0.5.0.

kaiengert, to random
@kaiengert@mastodon.social avatar

Hello community of users. I'd like to know if some of you are still stuck at Thunderbird version 68 and the old Add-on. Is there any missing functionality in Thunderbird 115 that is still preventing you from migrating? @thunderbird

hko, to random
@hko@fosstodon.org avatar

I've just released OpenPGP CA 0.13:
https://crates.io/crates/openpgp-ca/0.13.0

This version introduces the new "Split" mode of operation.
Split mode allows (relatively) easy operation of CAs that perform certification operations in a separate (e.g. air-gapped) environment.

For details about split mode OpenPGP CA, see https://openpgp-ca.org/doc/split-mode/

This work was supported by NLnet @NGIZero, thank you!

hko, to random
@hko@fosstodon.org avatar

While exploring use of PKCS devices in contexts, I stumbled over a bug (and potential security issue) in the yubihsm_pkcs11.so driver for devices.

Long form text by Christian Reitter (who walked me through the coordinated disclosure process with , and did amazing work analyzing and writing up the issue):
https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/

Yubico advisory: https://www.yubico.com/support/security-advisories/ysa-2023-01/

: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39908

(Thanks again to @sovtechfund for funding my work)

leak, to random
@leak@hachyderm.io avatar

Cryptography is a tool for turning a whole swathe of problems into key management problems. Key management problems are way harder than (virtually all) cryptographers think.

kkarhan,
@kkarhan@mstdn.social avatar

@roywig @thatandromeda @leak it is "good enough", cuz we ain't 15 years ago where eberything needed archaic commands.

integrates / out of the box for some time.
& do support - and like are so easy, it literally took me 5 minutes to explain the use and setup a complete in it.

People aren't stupid, they are lazy and get groomed into being ...

That is the problem!

oclsc, to random
@oclsc@mstdn.ca avatar

TIL the protocol everyone uses for appears to be documented only in an Internet Draft that expired about 20 years ago. Why did it never become an RFC if not an STD? Is it hiding in some hard-to-find RFC, or more-stably documented in some non-IETF place?

dvzrv, to archlinux
@dvzrv@chaos.social avatar

Packager and upstream work that could have been avoided by a reasonable phasing out of #OpenPGP signatures for #sdist tarballs on #PyPI: https://archlinux.org/todo/fix-reproducibility-of-packages-broken-by-pypi-removing-signature-files/

#archlinux #packagerlife #python

gerowen, to random
@gerowen@mastodon.social avatar

I miss the days of having multi-service messaging clients like Trillian that would connect to your AIM, MSN Messenger, etc. and have all your contacts from all those networks in one place. #Pidgin is still a thing, but it doesn't, as far as I can tell, support #OMEMO or #OpenPGP for their #XMPP implementation. I'd love to see something like Pidgin supporting Signal, add OMEMO/OpenPGP to their XMPP support, maybe support connecting to Facebook Messenger, etc. all in one application.

chrismessina, to random
@chrismessina@mastodon.xyz avatar

Thunderbird (Mozilla's open source email client) just got a redesign, including a , and is featured on Product Hunt:

https://www.producthunt.com/posts/thunderbird-115-supernova

Thunderbird 115 Disk Image and New App Icon.

kkarhan,
@kkarhan@mstdn.social avatar

@chrismessina I think @mozilla should've first focussed on making between @thunderbird / and aka. to be renamed ...

Like working , and with aka. /MIME...

dvzrv, to random
@dvzrv@chaos.social avatar

A couple of days ago sq 0.31.0 has been released (https://gitlab.com/sequoia-pgp/sequoia-sq/-/tags/v0.31.0).

This new version comes with a few usability improvements and a notable new feature (adding of subkeys), that are explained in more detail in this blog article: https://sequoia-pgp.org/blog/2023/07/05/202307-sq-commandline-improvements/

adlerweb, to threads German
@adlerweb@social.adlerweb.info avatar

Die ersten Instanzen blockieren . Einer der Gründe, warum ich selbst was hoste. Ich möchte gerne selbst bestimmen, mit wem ich föderiere und mit wem nicht. Ja, da wird viel Unfug her kommen, aber eben auch ein paar schwer zu ersetzende Quellen. Diese in Sippenhaft zu nehmen ist IMO kontraproduktiv. Insbesondere bei einer "Instanz", die mehr Nutzer haben wird, als der Rest des Feediverse. Oder dann halt Feedibubble.

kkarhan,
@kkarhan@mstdn.social avatar

@adlerweb Ich bin inzwoschen so sehr von den ganzen angepisst dass ich am liebsten nen -Provider starten möchte der jegliche unverschlüsselte eMails blockiert & ablehnt!

Ebfach damit Leute gezwungen werden zu nutzen und entsprechend zu konfigurieren!
https://social.adlerweb.info/@adlerweb/110674220781400077

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • provamag3
  • InstantRegret
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ethstaker
  • osvaldo12
  • modclub
  • normalnudes
  • anitta
  • tester
  • megavids
  • Leos
  • lostlight
  • All magazines