gpg -K --keyid-format long --with-colons XXXX | awk -F: '$1 == "fpr" { print $10; exit }'
Seems a bit convoluted to find the fingerprint of the primary key.
gpg -K --keyid-format long --with-colons XXXX | awk -F: '$1 == "fpr" { print $10; exit }'
Seems a bit convoluted to find the fingerprint of the primary key.
Do I know somebody who can tell me how to solve the error #GnuPG is giving me upon creating an encryption key on a #Yubikey 5C (NFC or nano -- no difference, but same yubi versions)
https://gist.github.com/jpmens/3fff91a2f0b17e0fcf3461d1889e9a3f
I've tried almost all algorithms, also rsa2048 thinking that's the issue, but. no -- irrespective of algo.
Edit: brian explains it https://mastodon.social/@bk2204/114246741802374278
My understanding of "This command destroys all keys stored on the card!" differs slightly from that of gpg-card.
Edit: if I follow with a `reset', `list' shows empty key slots. (?)
Warum noch mal war unsere kritische Infrastruktur im Netz, wie #letsencrypt oder #OpenVPN, von der US-Regierung abhängig?
Irgendwann braucht man nach #Heartbleed und #GnuPG-Krise auch nicht mehr Snowden zitieren, wenn die einzige Konsequenz, die man da nicht gezogen hat, die ist, dass Open Source-Entwicklung auch Geld kostet.
Und dass man das am besten auch nicht allein einer alle vier Jahre wechselnden Regierung überlässt.
Meine Datenschutz und Privatsphäre Übersicht 2025, für die Allgemeinheit
Teilen erbeten
als PDF:
https://cryptpad.digitalcourage.de/file/#/2/file/NdmBgSYkRCto8B+JmJkE9mQ4/
#DSGVO #TDDDG ( #unplugtrump )
#Datenschutz #Privatsphäre #sicherheit #Verschlüsselung
#encryption #WEtell #SoloKey #NitroKey #Email #Cybersecurity #Pixelfed #Massenűberwachung
#Google #Metadaten #WhatsApp #Threema #Cryptpad #Signal
#Hateaid #Cyberstalking #Messenger #Browser #Youtube #NewPipe #Chatkontrolle #nichtszuverbergen #ÜberwachungsKapitalismus #Microsoft #Apple #Windows #Linux #Matrix #Mastodon #Friendica #Fediverse #Mastodir #Loops #2FA #Ransomware #Foss #VeraCrypt #HateAid #Coreboot #Volksverpetzer #Netzpolitik #Digitalisierung #FragdenStaat #Shiftphone #OpenSource #GrapheneOS #CCC #Mail #Mullvad #PGP #GnuPG #DNS #Gaming #linuxgaming #Lutris #Protondb #eOS #Enshittification
#Bloatware #TPM #Murena #LiberaPay #GnuTaler #Taler #PreppingforFuture
#FediLZ #BlueLZ #InstaLZ #ThreatModel
#FLOSS #UEFI #Medienkompetenz
man 1 profanity-ox-setup
.07.03.2025: GnuPG announces release of 2.5.5 for public testing, finalized PQC algorithms are supported.
Source: https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
11.03.2025: NIST selects HQC as fifth algorithm for post-quantum encryption.
Source: https://www.nist.gov/news-events/news/2025/03/nist-selects-hqc-fifth-algorithm-post-quantum-encryption
PQC: https://wikipedia.org/wiki/Post-quantum_cryptography
GnuPG: https://mastodon.online/@blueghost/111974048270035570
Harvest now, decrypt later: https://mastodon.online/@blueghost/111357939714657018
If you have specific questions about #GnuPG, please ask them. There are a few ways to do so, for example https://forum.gnupg.org/c/gnupg/8 or https://lists.gnupg.org/pipermail/gnupg-users/ .
(Note that #GnuPG is a mature crypto engine and the command line interfaces are more like a multitool for experts or advanced users who do not mind to use the command line. However there are many good workflow oriented frontends, like email clients or file managers. No need to use `gpg` on the command line.)
@vlpatton The classic method is a key signing party. Get a bunch of people in the same room with legal photo identification and their fingerprints, and go around the room checking everyone else’s ID. Then, go home and sign everyone’s keys. Send the signed key to the key owner. Import signed keys and collect signatures!
Key servers sharing signatures haven’t been a thing since the attacks years ago. Any modern keyserver will strip the signatures, so you’ll have to distribute your key with signatures some other way (WKD, DNS, a file on your web site, etc.).
CAcert will do PGP key endorsements if you get enough assurances on their platform. Everyone with a signed key has had two forms of ID checked by two people. However, their infrastructure can only work on old-school RSA keys right now (they’re working on modernizing).
how does one perhaps acquire signatures for their PGP key? I'm wanting to build a web of trust, but I'm unsure if there's anyone I know personally (and especially in-person) who would be able to sign my keys...
fwiw, I use my keys to sign Git commits, mostly.
Today I migrated my #GnuPG self compile assistance project (WIP) from incubator repository to a dedicated repository (including the new version number 2.5.5):
#GnuPG 2.5.5 (dev) has been released (#OpenPGP / #GPG / #GNUPrivacyGuard / #PGP / #PrettyGoodPrivacy / #Security / #Gpg4win) https://gnupg.org/
The March release for #GnuPG in the PQC public testing release series is here: v2.5.5 only has a few fixes, but those seem important ... removing potential "hangs" on windows and elsewhere.
https://dev.gnupg.org/T7530
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
Has anyone here on #fedi figured out the correct recipe for dealing with #OpenPGP, #DMARC and #mailman ?
The problem, by default mailman will modify messages and this will break the dkim signature.
https://gitlab.com/mailman/mailman/-/issues/1079
Mailman provides two DMARC mitigation options (other option is reject or discard which is not useful in this case).
1. Replace the from address with list address
2. Wrap original message in an envelope
thunderbird flags 1 and fails 2.
#askfedi #gnupg #gpg #thunderbird
Everybody should learn how to use GPG.
ОПРОС
Каким средствам криптографии вы доверяете?