Did someone say encryption? Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df#GPG#PGP#E2E#encryption
Did someone say encryption? Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df#GPG#PGP#E2E#encryption
Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df#GPG#PGP#E2E#encryption
@vidakYou wrote your #PGP and #email,I couldn't help but be impressed,But I've tried now every keyserver,They all tell me #BadRequest.
(Bad Request oouu oouu)
I wanna #dance to the rhythm of your algorithm,Wrap my words in your #entropy,How can I do that if I just can't find em,I need your #PublicKey,– privately.
I remember reading a criticism of pgp’s interaction model (ie, issues around expanding the web of trust, and what is implied when a key is signed), but I can’t recall the exact nuance of it, and can’t seem to find what I’m thinking of when searching online. Anyone on here have a link for me? #pgp#cryptography
You think #PGP using #Java is complicated?You hesitate to introduce #OpenPGP encryption in your #Android app because you fear the complexity of #Bouncycastle?
Try PGPainless! An easy to use wrapper library that makes generating PGP keys and doing #encryption easy as pie!
This is a problem that we should have solved decades ago.
Still, works well in a business context, though nowhere near as much support as #X509, which is another option if you don't mind the hierarchical #CA model.
Not perfect either, I know, but I'd prefer a few well supported options rather than everybody jumping onto a different bandwagon every five years or so. 🤷
Part 2 of my email options for secure email along with providers that I personally use. Bare in mind do to my uses all of these are onion services that only use the Tor network; you will not be able to use these services without using Tor, please bare in mind that you will not be able to send or receive from a non Tor network email address, currently protonmail is one of the few exceptions however they do not meet my criteria as a proper hidden service to be listed in my list. These services can be slightly more complicated to use however they do offer vastly better anonymity and when used with PGP offer very good security for your communications.
Oh and I threw in an onion WordPress hosting provider for anyone interested in making uncensored blogs, remember payment is only accepted through crypto.
I would recommend saving these links and checking the pgp signatures to avoid getting a phishing link commonly used to steal credentials for these services.
Oh and a friendly warning some of these services have ads on there homepages, please do not fall for the scam ads. Absolutely all of the ads seen on these services are fake DO NOT FALL for them.
That #Tails "use the WoT" download #verification guide is telling you to do 2 distinct things: 1) use #PGP WoT metrics to identify someone who is a Tails developer (but not AFAICT to identify that person *as* a Tails developer); 2) make a WoT-less leap from "this is Bob" to "Bob is verified as a Tails developer AND his signatures mean something".
In that "→A→B→C" chain of mixed ops, #WoT only takes you to B.
That #PGP's #WoT metrics (supposedly) propagate through signature-chains is somehow basically an extremely popular #myth; "talks about WoT being all about arbitrarily-long multi-hop chains of trust" and "conflates #trust and #identity #certification" have been "understands-pgp-p" litmus tests for me since I realized how confused *I was myself* years ago, and they've never failed before.