As a first step towards adding Object Integrity Proofs (FEP-8b32) to #Fedify, I've made it support #Ed25519 keys. I've also enabled multiple keys to be associated with an actor. For example, if you look at the actor from the Fedify Example Blog (https://fedify-blog.deno.dev/users/fedify-example), you'll see that it has two public keys, one for RSA and one for Ed25519.
You can try it out in version 0.10.0-dev.190+4dffb89a.
To all who are hosting their own #dns#authoritive server with #dnssec - what do you use in 2024?
#Ed25519 or #ECDSA-P256 or still on some #RSA algorithms? Shorter key length is especially in DNS a benefit but still not all resolvers may be able to support this in 2024?!
Today I learned that each time you derive an OpenSSH private key (say from an ed25519 private key), by design, you get a slightly different key (12 of the characters will be unique to each exported key even though the keys are equivalent to one another).