securedrop, to rust
@securedrop@fosstodon.org avatar

SecureDrop is migrating its PGP backend from GnuPG (@GnuPG) to Sequoia (@sequoiapgp).

Learn why and how we stopped shelling out and started shipping Rust code instead:

https://securedrop.org/news/migrating-securedrops-pgp-backend-from-gnupg-to-sequoia/

kaiengert, to random
@kaiengert@mastodon.social avatar

Hello community of users. I'd like to know if some of you are still stuck at Thunderbird version 68 and the old Add-on. Is there any missing functionality in Thunderbird 115 that is still preventing you from migrating? @thunderbird

garritfra, to random
@garritfra@fosstodon.org avatar

I did a thing! ✨

Some people don't see the value of using a password manager and keep sharing their streaming service passwords with their friends and relatives in plain text.

This is an attempt to simplify the process of sending encrypted passwords for non-technical users, using local encryption with temporary keys.

https://sendpasswords.net/

I'd be happy about any feedback and suggestions. Also, feel free to share this with your friends and relatives!

RachaelAva1024, to privacy

:BoostOK: Because DMs are not end-to-end encrypted on Mastodon or on any Fediverse social media platform, your instance admin can read your DMs, and so will any unauthorized individuals if the DMs gets leaked.

If you send a DM to anyone on the Fediverse, make sure it's something you wouldn't mind if it ever gets leaked. If you DO mind, use a privacy-respecting end-to-end encrypted platform like Signal, Session, or Matrix.

Alternatively, you can encrypt your messages using PGP if they list their PGP key in their bio and send them via DMs on the Fediverse. Even better, you can use PGP to send your Signal, Session or Matrix address via DMs.

RTP, to news
@RTP@fosstodon.org avatar

Don't Submit Personal Calls / Data / Biometrics To AI Training (Empowering Abuse Potential, Disempowering End Users) For Video Calls

AI Training Can Also Be A Fancy Way Of Saying "Putting You Under Surveillance"

Instead, Use Signal / Session / XMPP + PGP / OMEMO / Jitsi

https://stackdiary.com/zoom-terms-now-allow-training-ai-on-user-content-with-no-opt-out/

blueghost, to opensource
@blueghost@mastodon.online avatar

LibreOffice supports symmetric and asymmetric encryption for OpenDocument Format (ODF) files.

Symmetric encryption: https://en.wikipedia.org/wiki/Symmetric-key_algorithm
Asymmetric encryption: https://en.wikipedia.org/wiki/Public-key_cryptography

Select File > Save/Save As

The "Save with password" option encrypts the file with AES-256.
The "Encrypt with GPG key" option encrypts the file with a public key.

Website: https://www.libreoffice.org
Mastodon: @libreoffice

blueghost, to email
@blueghost@mastodon.online avatar

Thunderbird is an email client with built-in support for PGP encryption.

Messages are encrypted/decrypted in the client and remain encrypted on email servers, this is client-side encryption.

Some email providers support PGP encryption server-side, this method could be vulnerable to third-party decryption of emails.

PGP: https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Client side encryption: https://en.wikipedia.org/wiki/Client-side_encryption

Website: https://www.thunderbird.net
Mastodon: @thunderbird

sethi, to linuxphones

Finally reading encrypted email on my . 🎉

With the latest version of and , it's still shoddy, but we can actually set up and read emails. No issues with launching or window sizing!

It's not mobile optimized at all, so I had to minimize the font size and zoom, and to read emails we need to double-tap, so it opens in a new tab.

It's not ideal, but none of the mobile optimized clients support PGP encryption at all afaik, so I'm very pleased with this.

fsf, to random
@fsf@hostux.social avatar

Did someone say encryption? Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df

stf, to random
@stf@chaos.social avatar

there is some drama in land, apparently the opengpg standard is contested by gnupg author werner koch, who forked the standard into librepgp: https://blog.pgpkeys.eu/critique-critique.html

pgpkeys, to random

The project leader of has announced a fork of the standard, justifying it with a list of accusations against the working group that fall apart under scrutiny. is being threatened with destruction over a personal grievance. We strongly urge de-escalation.

https://blog.pgpkeys.eu/critique-critique

vanitasvitae, to random German
@vanitasvitae@fosstodon.org avatar

/me is now co-author :D

I'm proud to present "OpenPGP for Application Developers" on which we worked for the past 3 months as a team of 6.

Thanks for @sovtechfund for sponsoring the work and thanks to @hko @MsUppity @dvzrv, @wiktor and Sabrina for the pleasant collaboration!

nwalfield, to random
@nwalfield@mastodon.social avatar

We're trying to polish sq, Sequoia #PGP's CLI, in preparation for our 1.0 release this summer. One place we could use some help is with the CLI's UX: are the subcommands and options sane, and consistent? Also, we want to provide guidance so that user's don't need to memorize workflows, but are nudged along. See for instance: https://gitlab.com/sequoia-pgp/sequoia-sq/-/issues/221 If you are interested in helping, please reach out!

sequoiapgp, to random
@sequoiapgp@mastodon.social avatar

Sequoia PGP's paid development is financed by @sovtechfund (❤️ ). In addition to writing code, they also support our standardization work, and community outreach. In this blog post, I discuss some of our community engagement (presentations and collaborations with sett, @securedrop, and @fedora) that have happened over the past few months.

https://sequoia-pgp.org/blog/2024/04/25/202404-community/

fsf, to random
@fsf@hostux.social avatar

Did someone say encryption? Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df

hko, to random
@hko@fosstodon.org avatar

Having decidedly too much fun playing with ancient artifacts.

Note the two version 2 public keys from 1992. They were created just over a year after Phil Zimmermann first released PGP (on 6 June 1991), deep in the crypto war era.

These keys predate the name by around half a decade.

At over 31 years old, nation-state actors can definitely factor John Gilmore's RSA 1024 key today.
However, I believe the cost still exceeds a hobbyist budget even now.

hko, (edited ) to rust
@hko@fosstodon.org avatar

In the past few weeks, I spent a bit of time on a set of hobby projects around (https://github.com/rpgp/rpgp/). Today I'm happy to announce:

rsop v0.1.0 (https://crates.io/crates/rsop), an early stage "stateless OpenPGP" tool based on rpgp.

Relatedly, I also released rpgpie 🦀️🔐🥧 v0.0.1 (https://crates.io/crates/rpgpie), an experimental high level OpenPGP API based on rpgp (rsop is built on top of rpgpie).

hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.0.1 of the new crate https://crates.io/crates/openpgp-card-state

This crate paves the way for convenient handling of card User PINs, for users whose threat model allows persisting the PIN locally on the host computer.

If a User PIN is stored, applications can obtain it via this crate, and perform cryptographic operations without prompting the user for PIN entry.

Currently org.freedesktop.Secret is supported for storage.

Thoughts are welcome!

fsf, to random
@fsf@hostux.social avatar

Did someone say encryption? Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df

orbitalmartian, to random
@orbitalmartian@alpha.polymaths.social avatar

Does anyone know how to setup #mutt with a #pgp key? I want to figure this out XD #AskFedi

aredsquirrel, to linux
@aredsquirrel@mastodon.social avatar

Everyone should learn how to self-verify with their own cryptographic keys.

Why rely on a third party to verify, where you have to upload your own ID?

Verifying accounts with a central authority is laying trust in that authority, and taking risk, trusting them they can protect your identity and not abuse that position.

The proof is in the history of identity and activity of the key.
It is best to start learning now and build up an identity.
#pgp #linux #foss

sequoiapgp, to random
@sequoiapgp@mastodon.social avatar

Last year, the @sovtechfund fund invited us, the Sequoia PGP Project, to join their new Bug Resilience Program.

Today, I'm pleased to announce that we are publicly launching our bug bounty program with rewards of up to €10,000 for novel, security-relevant issues in Sequoia applications, libraries, or specifications.

https://sequoia-pgp.org/blog/2024/04/10/202404-bug-bounty/

purism, to linuxphones
hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

tallship, to privacy

#e2ee is a goal, not a promise. As far back as I can remember, forums like those supporting #Enigmail and #gpg were staffed with volunteers from the privacy community who repeatedly insisted on answering questions, like, "Is <this> (whatever this might be) totally secure?" with stock questions like, "What is it that you consider 'totally secure?" or answers such as, "Secure is a relative term, nothing is completely secure, how secure do you need your mission's communications to be?"

Phrases such as, reasonably secure should be indicators of how ridiculous it is to assume that any secure platform is EVER completely, and totally secure.

That begs the question, "Exactly how secure do you require your communications to be?" The answer is always, ... relative.

Which means that you should always believe Ellen Ripley when she says, "Be afraid. Be very afraid!"

https://www.city-journal.org/article/signals-katherine-maher-problem

#tallship #encryption #PGP #secure_communication #Privacy #FOSS

.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • InstantRegret
  • GTA5RPClips
  • Youngstown
  • everett
  • slotface
  • rosin
  • osvaldo12
  • mdbf
  • ngwrru68w68
  • JUstTest
  • cubers
  • modclub
  • normalnudes
  • tester
  • khanakhh
  • Durango
  • ethstaker
  • tacticalgear
  • Leos
  • provamag3
  • anitta
  • cisconetworking
  • lostlight
  • All magazines