#PGP

2026-01-03

Et si on remettait au goût du jour un Web of Trust pour différencier les contenus générés par des humains de ceux générés par IA ?

Tout contenu non signé par une clé (GPG ?) connue de notre WoT serait considéré comme suspect. Les gens s'inscrivant dans le WoT s'engageraient à ne pas utiliser (du tout) d'IA générative.

Les contrevenants se verraient exclus du WoT, et les personnes qu'ils seraient seuls à avoir cooptés partageraient leur sort.

#WoT #NoIA #PGP #GPG

2026-01-02

I received a pair of #PGP encrypted postcards from #39c3 and I will now complain about it.
The idea is pretty cool, although printing the message as human-readable text was sub-optimal to say the least. I didn't immediately know how to re-format the message so that GPG could parse it (because the newlines were messed up). OCR wasn't of much help either and the font made it hard to distinguish 0 and O, as well as 1 and l. In the end, I had to get the sender to send me the original message. A QR code would've been much better, although the printer at the event apparently couldn't print those.
Also, this happened:

A close-up of one of the postcards where the top layer of paper has partially come off.
Jen 🏳️‍⚧️jvw@musicians.today
2026-01-02

From the annual Chaos Computer Club series: bugs in GnuPgp. Not in the math part, but in the parser and maybe elsewhere?

As someone with tons of enterprise programming exp, this would be a cool place to jump in.

media.ccc.de/v/39c3-to-sign-or

#pgp #cryptography

2026-01-02

Either I'm schitzophrenic or the Dead Internet Theory has progressed from merely an occasionally noticeable phenomenon ("theory") to a default on the bigger social media platforms?

en.wikipedia.org/wiki/Dead_Int

Will we have to go full #PGP and have Real Person Certified™ corners of the internet?

Also, don't look up why Eglin Air Force Base (Florida, US) was on the list of "most #Reddit addicted cities" in 2013.

#DeadInternet #DeadInternetTheory #SocialMedia

2026-01-01

Consider hosting a CryptoParty in 2026.

Key signing parties are simple to host in person with no computers required.

A key signing party is an event where people exchange their public encryption key fingerprints, this allows participants to verify a person's identity before digitally signing their encryption key.

CryptoParty: wikipedia.org/wiki/CryptoParty
Key signing party: wikipedia.org/wiki/Key_signing

Website: cryptoparty.in

#CryptoParty #Encryption #Privacy #InfoSec #CyberSecurity #PGP #GPG

CryptoParty logo.
Daniel 黄法官 CyReVolt 🐢CyReVolt
2026-01-01
Bruce Walzer 🇨🇦upofadown@mstdn.ca
2025-12-31

@hko

Here is a gnupg-users thread where I suggest that emitting new block modes (OCB here) is a Bad Idea™ when the schism exists:

marc.info/?t=170955787300002&r

I think it has come up less directly in my interaction with the mailing lists as well. I think that at this point it counts as a point of contention between me and the GnuPG project. There was once an instance where someone thought that my criticism meant that I supported the 9580 faction. It got awkward... :)

I am quite critical of the GnuPG project on this point in my article about the schism:

articles.59.ca/doku.php?id=pgp

#Openpgp #pgp

Bruce Walzer 🇨🇦upofadown@mstdn.ca
2025-12-31

@hko My understanding is that GCM is a significant point of contention in the OpenPGP standards schism. So it would be relevant here. I have not seen any evidence presented that it would be more efficient than OCB for web applications. My estimation is that it would not be. Even if it was, the sorts of things done as web apps involve short messages (email).

That signalling that you mention (the preferences in the public key) only works for asymmetrical encryption and is not reliable. I have an entire page of examples of where it has failed:

articles.59.ca/doku.php?id=pgp

... and that is up to now just for a single implementation. Things could get much worse. That page is a reference for this article:

articles.59.ca/doku.php?id=pgp

Somewhat ironically, it can be legitimately argued that CGM is overall less secure than the existing OCFB-MDC (SEIPD) mode:

articles.59.ca/doku.php?id=pgp

The relative insecurity of GCM has also come out as a factor in the schism.

#openpgp #pgp

2025-12-30

@soatok what I don't get is why you take this opportunity to attack in general, like taking the opportunity to push for some agenda, the site is called gpg.fail, GPG not PGP, most of the problems are related to gpg or some C code implementation bug, or using gpg and others in the command line and getting tricked by some ansi printing in the terminal, how that translates to "let's kill pgp"? ex. none of the listed problems affect at all

(I was present in the gpg.fail talk btw)

Jan Wildeboer 😷:krulorange:jwildeboer@social.wildeboer.net
2025-12-30

By the way, just a few weeks ago I posted on how you can create S/MIME certificates yourself using step-ca that can be used for email encryption and signing ;)

jan.wildeboer.net/2025/08/Crea

#PGP #GPG #OpenPGP

Kai und der Andere 🎗️walsonde@antifa.style
2025-12-29

Warum warnt mich #DeltaChat davor, dass chats über E-Mail nicht verschlüsselt werden können? Die Möglichkeit der Ende-zu-Ende-Verschlüsselung mittels #PGP ist doch einer der größten Vorteile von E-Mails. Was passiert hier?

Bruce Walzer 🇨🇦upofadown@mstdn.ca
2025-12-29

@heiseonlineenglish More accurately, the GnuPG project has disagreed with some of the proposed fixes and are not doing them. I have not looked closely at them (The GunPG project is more knowledgeable than me). But I agreed with GnuPG in at least one case: news.ycombinator.com/item?id=4

This might be an example of the common case where the people who find the vulnerability should not be the ones to devise a fix or decide if a fix is required.

#PGP #openpgp #gnupg

2025-12-29

39C3: Multiple vulnerabilities in GnuPG and other cryptographic tools

Security researchers have found various security-relevant errors in GnuPG and similar programs. Many of the vulnerabilities are (still) not fixed.

heise.de/en/news/39C3-Multiple

#ChaosCommunicationCongress #IT #Verschlüsselung #PGP #news

Kevin Karhan :verified:kkarhan@infosec.space
2025-12-28

This may be considered #HotTakes by some, I consider these #based: (no ragebait inteded!)

If you have a problem with these, please kindly fuck off in silence!

This list is non-exhaustive...

Aaron Toponce ⚛️:debian:atoponce@fosstodon.org
2025-12-28
2025-12-28
Alexandre Dulaunoya@paperbay.org
2025-12-28

I’m looking at age for many times especially to replace OpenPGP. They did a new release and for encryption at rest, it’s indeed a good replacement.

But how to integrate it with email encryption ? They recently did a keyserver words.filippo.io/keyserver-tlo and release an update version of age.

Are we close to a real replacement for OpenPGP ?

#pgp #age #openpgp

github.com/FiloSottile/age/rel

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst