Messenger: Delta Chat
Obwohl es mehr als genug Messenger gibt, überzeugt Delta Chat durch Benutzerfreundlichkeit und erprobte Technik.

Messenger: Delta Chat
Obwohl es mehr als genug Messenger gibt, überzeugt Delta Chat durch Benutzerfreundlichkeit und erprobte Technik.
> apt-listchanges: News
> debian-archive-keyring
> Certificate (keyring) files in /usr/share/keyrings now have the file extension .pgp, rather than .gpg.
Boo
apt-listchanges: News#Debian #GnuPG #GPG #OpenPGP #GNU
---------------------
gnupg2 (2.4.7-4) experimental; urgency=medium
The upstream GnuPG project now explicitly and deliberately diverges from
the OpenPGP standard. Debian's own workflows rely heavily on OpenPGP,
and we ship several different OpenPGP implementations, so
interoperability via standardization is a priority for the project.
While Debian still has significant dependencies on GnuPG, the version of
GnuPG shipped in Debian will default to emitting only OpenPGP-compatible
artifacts if at all possible. As of 2.4.7-4, the default
is --compliance=openpgp, and we apply several patches to ensure that
this mode is respected.
If you observe GnuPG in Debian emitting a non-OpenPGP artifact in a
scenario where a standard OpenPGP artifact is intended or expected,
please open a critical bug report in the Debian BTS.
If you want Debian's GnuPG to emit non-standardized artifacts, in line
with upstream's deliberate divergence, you can explicitly pass
--compliance=gnupg (or set the corresponding option in
~/.gnupg/gpg.conf). If you revert to compliance with upstream defaults,
do not expect the material you produce to be interoperable with other
OpenPGP implementations.
-- Daniel Kahn Gillmor <dkg@fifthhorseman.net> Fri, 07 Feb 2025 23:35:29 -0500
For years now I’ve had a bit of a bee under my cap: would it be possible to unlock a Vault file with a GnuPG-compatible smart card? And what if the smart card were local and the unlocking had to be triggered remotely?
Forwarding GnuPG agent over SSH
https://jpmens.net/2025/04/04/forwarding-gnupg-agent-over-ssh/
Edit: I have amended the sentence regarding distinct machines. Works fine on two different Linux boxes.
@Xeniax Totally nerdsniped :D I'd love to be a part of the study.
I don't think that #KeyServers are dead. I think they evolved into Verifying Key Servers (VKS), like the one run by a few folks from the OpenPGP ecosystem at https://keys.openpgp.org/about . More generally, I believe that #PGP / #GPG / #OpenPGP retains important use-cases where accountability is prioritized, as contrasted with ecosystems (like #Matrix, #SignalMessenger) where deniability (and Perfect Forward Secrecy generally) is prioritized. Further, PGP can still serve to bootstrap those other ecosystems by way of signature notations (see the #KeyOxide project).
Ultimately, the needs of asynchronous and synchronous cryptographic systems are, at certain design points, mutually exclusive (in my amateur estimation, anyway). I don't think that implies that email encryption is somehow a dead-end or pointless. Email merely, by virtue of being an asynchronous protocol, cannot meaningfully offer PFS (or can it? Some smart people over at crypto.stackexchange.com seem to think there might be papers floating around that can get at it: https://crypto.stackexchange.com/questions/9268/is-asynchronous-perfect-forward-secrecy-possible).
To me, the killer feature of PGP is actually not encryption per se. It's certification, signatures, and authentication/authorization. I'm more concerned with "so-and-so definitely said/attested to this" than "i need to keep what so-and-so said strictly private/confidential forever and ever." What smaller countries like Croatia have done with #PKI leaves me green with envy.
“Unless you are using #GPG, email is not end-to-end encrypted, & the contents of a message can be intercepted & read at many points, including on Google’s email servers,” said Eva Galperin, director of #cybersecurity at the Electronic Frontier Foundation.
#NationalSecurity experts have expressed alarm over the #Trump admin’s denial that the leaked #Signal chat contained #classified information.
#porkbun has #email with @protonprivacy, really affordably. So I switched my business mail to that, and I have it all setup in #emacs! :D @daviwil is a goddamned treasure. I would not be able to setup my workflow this well without Systems Crafters! I'm happy! I feel so #secure and #cozy, and I can do #gpg for a little extra. Just don't let crazy Christians on my e-mail chains. I don't want to pull a Hegseth.
I recently realized that Git commits could be made on your behalf without your consent.
This could happen because either you left your computer unlocked in a public place (or any place actually), your computer got stolen and the disk wasn't encrypted or any of those combinations.
To prevent this, Git has a "signing" mechanism that proves without any doubt that you made that commit.
It uses GPG, and with power of cryptography, it protects your work from being hacked.
Has anyone here on #fedi figured out the correct recipe for dealing with #OpenPGP, #DMARC and #mailman ?
The problem, by default mailman will modify messages and this will break the dkim signature.
https://gitlab.com/mailman/mailman/-/issues/1079
Mailman provides two DMARC mitigation options (other option is reject or discard which is not useful in this case).
1. Replace the from address with list address
2. Wrap original message in an envelope
thunderbird flags 1 and fails 2.
#askfedi #gnupg #gpg #thunderbird
@lns sorry, but no. gnupgp UX sucks so hard that even I don't get it without extensive internet searching.
And I heard horrible stuff about integration into programs, like that they need to kill the #gpg daemon regularly to make it work.
Let's rather invest our efforts into making modern alternatives like #rpgp and #rsop
https://crates.io/crates/rsop/ great.
Everybody should learn how to use GPG.
Hallo #unplugtrump, ich suche unter #ios und #ipados ein #mail program am besten #opensource mit Möglichkeit #gpg / #pgp zu verwenden.
Danke
To those still concerned with #Proton #ProtonMail: I've been trying out Lacre (https://lacre.io), which encrypts incoming #email with your #GPG key, on #Disroot. So far it has worked fairly well! If you have an account with them, see https://disroot.org/en/blog/disnews-24.11 for enrollment, though the admin had a backlog when I requested it... And if you don't, consider trying it out! (Custom domains are available: https://disroot.org/en/perks, which I have for my main email right now.)
#gpg is really annoying and hard to understand...
@jbz what I'd like to know is if I can run #ArcaOS in a VM or get a container version. I tried installing #eComStation from CD's in #VirtualBox, based on someone's video, but utterly failed.
All I really want to do is run an old version of #PGP so I can extract my keys and use them as the basis for new #GPG keys. Apparently GPG's backward compatibility only goes so far
#TIL
Man kann den #passwortmanager #pass von https://www.passwordstore.org/ tatsächlich in knapp einer Stunde auch auf Windows zum Laufen bekommen (KAF = kids acceptance factor). Man braucht nur noch #gpg und #git und dann kann es auch schon losgehen:
https://github.com/mbos/Pass4Win#readme + https://www.gpg4win.de/download-de.html
Das Kind ist total happy, dass es die Passworte nun nicht mehr nur auf dem #iphone #ios hat Das andere hat sich für die "Passwörter" #app auf #ios entschieden. Mal sehen wie lange noch
Set up NixOS in WSL2, with a custom Linux Kernal, allowing USB passthrough for my YubiKey:
https://github.com/JHilmarch/nixos-config/tree/main
Thanks @LGUG2Z and @jakobankarhem for the introduction to the Nix world!
Ich habe ein neues Programm in meinem Portfolio:
https://codeberg.org/CarstenHa/gpg-oneuid
Mit diesem kann man den öffentlichen GnuPG-Schlüssel seines Schlüsselpaares mit nur einer bestimmten Mailadresse
exportieren. Dies ist besonders praktisch, wenn man für seinen Schlüssel mehrere UIDs angelegt hat und nicht alle
seine Mailadressen mit dem öffentlichen Schlüssel mitteilen möchte.
#FOSDEM 2025 - anyone interested into #GPG key signing?
If you're interested:
* Provide a printed snippet of your fingerprint (gpg-key2ps)
* I will send you the signing to your email (instead of uploading them to key servers [gpg-mailkeys])
* You can find my key at https://gpg.gyptazy.com and you're allowed to upload them to key servers.
* Have you passport / ID card with you to validate your identity
* I'll probably be mostly in the #BSDDevroom but you can also ping me on Matrix
Happy key signing!