StefanDT, to random German

Warum es gut ist, alle Mails zu verschlüsseln? Falls mal Bayerns Polizei Website und Mailserver beschlagnahmt.
Festplatte verschlüsseln auch gut - falls die Polizei morgens anklopft.

galdor, to random
@galdor@emacs.ch avatar

I've read a lot of complaints about recently. Apparently it's obsolete, ill-designed, unsecure… But no one is able to tell me what I'm supposed to use instead. Rants talk about half a dozen experimental tools that do a fraction of what PGP does and aren't supported anywhere. Not helping.

If you want to change the game, start by providing a solution.

elmiko, to random
@elmiko@fosstodon.org avatar

looking for some advice. i updated my key several years ago with some email aliases, but now i want it to be more authoritative. is the best option to deprecate the old key and start a new one, or is there a way to invalidate some of the aliases?

nwalfield, to random
@nwalfield@mastodon.social avatar

I'll be giving a talk at 19.00 this evening (Wednesday, May 24) in Zurich at CCCZH@Bitwäscherei: "Sequoia PGP: Pretty Good Public Key Infrastructure" on , web of trust, and the tools we are building to make authentication easier. A screenshot below. (Come a bit earlier as the entrance is hard to find.) https://www.ccczh.ch/hackerspace/

bodomenke, (edited ) to random German
@bodomenke@hessen.social avatar

Frage mich gerade, ob es eine Renaissance von geben und die private 1:1-Kommunikation in Händen der Endnutzer verschlüsselt werden wird?

Wie damals™️ in den frühen Zeiten der . Diesmal nur on top von Instant Messaging wie bspw. Signal, WhatsApp, etc.

qbi, to programming German

In dem Blogpost hat sich @yossarian die Signaturen von PyPI-Paketen angeschaut.
Ergebnis: schlimmer als nutzlos
Schlüssel nicht erhältlich, Signatur längst abgelaufen etc. Wenn ihr euch mal gruseln wollt, lest den Beitrag.

PGP signatures on PyPI: worse than useless
https://blog.yossarian.net/2023/05/21/PGP-signatures-on-PyPI-worse-than-useless

mjgardner, to infosec
@mjgardner@social.sdf.org avatar

Holy shit, @protonmail just doubled my base storage to six terabytes for , , etc. I’m only using a little over 16 GB.

Granted I’ve been a paid subscriber since the summer of 2016 (first on their Plus plan, then on Visionary starting the following year). But this is ridiculous.

Sign up here: https://pr.tn/ref/0Z7R6D2AX92G

mgorny, to linux

When I search for " developer keys", the first result includes instructions for fetching these keys:

https://www.gentoo.org/inside-gentoo/developers/

When I search for " developer PGP keys", I get straight to the Debian key server:

https://keyring.debian.org/

So why is finding developers' keys so hard?!

I can't bump because the only copy of the signing key I could find is on the public Ubuntu keyserver (sigh), and it's expired.

ConsummateTinkerer, to linux

A really short post on how to install a Geany plugin under and use .

https://consummatetinkerer.net/encrypt-decrypt-text-using-pgp-and-geany/

arstechnica, to random
@arstechnica@mastodon.social avatar

Microsoft is scanning the inside of password-protected zip files for malware

If you think a password prevents scanning in the cloud, think again.

https://arstechnica.com/information-technology/2023/05/microsoft-is-scanning-the-inside-of-password-protected-zip-files-for-malware/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

kikobar, (edited )
@kikobar@acc4e.com avatar

@arstechnica yes, password-protected zip files are just an illusion of privacy.

In fact, these researchers were not using them for privacy, but as a way of sending malware samples to each-other without being stopped by the malware scanners.

What I don't understand is why so many banks and financial institutions are so fond of them. They keep sending sensitive information via email on password-protected zip files where the password is your ID or your birthday... 🙄

Proper end-to-end encryption has been around for decades. 🤷‍♂️

topher, to infosec

Those of you who use PGP for email, do you typically generate a sign and an encrypt RSA subkey - and use those? Or what's the best practice?

Wanting to publish my PGP public key on my profile and website and start rocking that far more aggressively, but don't want to do stuff less-than-ideal and then have to change and re-publish keys again later and etc.

ainmosni, to random
@ainmosni@berlin.social avatar

Hey minded bubble, I vaguely remember there were more open versions of keybase, but I can't remember the name, does anybody know what I'm talking about?

gwynnion, to random
@gwynnion@mastodon.social avatar

There's this attitude that Mastodon does everything perfectly when it comes to combating racism, harassment, and other problems, which I find somewhat strange.

Mastodon does well, for example, in enabling server level blocks and defederation and the ability to import (hopefully curated) block lists from other users, although the latter functionality is not obvious to many people.

The number of severs, admins, and moderators also contributes to better human level attention of moderation issues.

petrescatraian,

@gwynnion This point applies to just about any social media platform. Do you think Twitter/Instagram DMs are not visible to Twitter or Instagram owners? Or that messages you send in Facebook Messenger are invisible to Meta and it's advertising and data collecting machine? Have we so easily forgotten the entire Cambridge Analytica scandal and how large corporations use the data on the social platforms (including private messages) in order to target you with advertising or social campaigns?

It's great that you brought this up in discussion, this just shows the need for everyone to jump ship to a trully private, secure and end-to-end encrypted messenger solution.

There's which is really easy to set up and use. All you need is a phone number and you're done. also encrypts your messages if you use the private chatrooms, and you can also set your phone number to be hidden, and use a user ID instead for searchability. Want even more security and descentralization as well? there is and @joinjabber that allow you to pick any server and client of your choosing (Matrix encrypts all your messages by default, on XMPP there is a thing called OMEMO which is server and client (or app) dependent - more details here).

Or you can just create a key and encrypt the text you want to send on Mastodon like that.

I know it all sounds too complicated for the average folk, on one side, but on the other, if we do not understand technology, it's limitations and it's capabilities, we will never get to use it to full potential.

I put my XMPP address in my profile on this purpose - you can see it if you click on the 3 dots menu while in my profile, then "open original page".

nwalfield, to random
@nwalfield@mastodon.social avatar

RPM uses OpenPGP to protect software updates. In the fall of 2022, it switched from using its own internal OpenPGP implementation to Sequoia. Last week, Fedora 38 was released with a version of RPM that uses Sequoia. I've written about the 1.5 year journey in a blog post.

https://sequoia-pgp.org/blog/2023/04/27/rpm-sequoia/

ethanschoonover, to random
@ethanschoonover@mastodon.social avatar

Will this be Mastodon's VHS or Betamax moment?

I haven't tested Bluesky but I can say that if Mastodon wants to stay competitive (and I hope it does), it needs to address SEARCH & SURFACING fast.

The first open-protocol network that enables news and fast breaking events to surface easily and with functional search will win the market. You'll see journos, sports, etc. migrate to the platform that gives them that visibility.

There is a window of opportunity here but it doesn't stay open long.

kkarhan,
@kkarhan@mstdn.social avatar

@ethanschoonover I don't.

I see this as necessary , just like - for Messaging and /MIME - encrypted .

At a certain point I'm sick and tired of accomondating ignorant users.

Shit's being documented to hell in both text, audio and video for everyone to find.

If people find that too hard, then said people should not be allowed to go outside unaccompained...

kikobar, to random
@kikobar@acc4e.com avatar

@jwildeboer I have been using S/MIME with since at least 2015.

Many of the reasons described in the forum are true, which does not mean S/MIME is impossible to fix or use.

There is native support for S/MIME in many email clients both desktop and mobile/tablet, including most of the 'stock' clients installed by default in most of the devices, so this is not an issue.

I think the big problems are basically 2:

1.- Having a throwaway key and certificate every 30 days (as we do with Letsencrypt SSL/TLS) is very inconvenient because we would need to keep a long collection of them in order access old messages.

2.- People access their email from multiple devices, so syncing the private key securely across all of them becomes a challenge.

For the tech savvy, both problems are manageable:

1.- You can get a free S/MIME certificate from valid for 1 year here:

https://www.actalis.com/s-mime-certificates.aspx


Please read a very important reply to this post by @duxsco pointing out to the insecurity of the Actalis certificate, and providing a secure but not free alternative.


2.- You can manually add this certificate to all your devices and keep an encrypted/secure repository with all your old keys and certificates in case you need to access your archived email.

I've been doing exactly that for years and it is just fine for signing my email.

IMHO for 'fixing' the whole signing and encryption of emails, is conceptually closer to be a more consistent solution, and I use it with everyone who understands it, but I have to admit that the ecosystems is far less ready than for S/MIME (you will need to use specialised apps or installed plugins, etc.), Thunderbird being a shining exception.

PGP has several very powerful advantages:

1.- You don't need a CA for the sole purpose of generating your keys.

2.- You can use the same keys for many years.

3.- People who really trust each other can sign each other's keys creating a web-of-trust.

4.- There is a free network of keyservers where you can upload your public keys and make them available to everyone.

5.- Most people these days have their own website, blog or social media account where they can publish their public keys for cases when they distrust the public servers. They can manually exchange them too.

In the long run I believe we should promote the adoption of OpenPGP instead of S/MIME, with more people using it, native support should follow.

I am not an expert though, so I'd love to hear from others too. 😊

freemo, to linux
@freemo@qoto.org avatar

It is so nice to finally have my whole company as well as my personal computers on hardware encryption, pgp key enabled, password store behibd pgp key, yubikey based pgp card, and ssh key using my pgp key through yubikey.

Other than being more secure it also means i dont need to backup my ssh keys or password store credentials, its all reproducable from my pgp keys.

kohelet, to opensource
@kohelet@mstdn.social avatar

Did you know?
If you use , you can save documents to be protected with a password, or encrypted with a key.

I didn't know that. I didn't see a similar option when using MS Word for example.

Just another reason to move to LibreOffice from MS office.

Edent, to android
@Edent@mastodon.social avatar

Can anyone recommend a key manager for ?

I was using OpenKeyChain - but is has been abandoned https://github.com/open-keychain/open-keychain

(Looking for personal recommendations - not search results. Thanks.)

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • rosin
  • thenastyranch
  • ethstaker
  • DreamBathrooms
  • osvaldo12
  • magazineikmin
  • tacticalgear
  • Youngstown
  • everett
  • mdbf
  • slotface
  • ngwrru68w68
  • kavyap
  • provamag3
  • Durango
  • InstantRegret
  • GTA5RPClips
  • tester
  • cubers
  • cisconetworking
  • normalnudes
  • khanakhh
  • modclub
  • anitta
  • Leos
  • megavids
  • lostlight
  • All magazines