1500+ entries in 0.422s
assbot: Logged on 20-08-2015 23:05:51; ahmed_bodi: Occasional trader. remember trading with a few people here. lost my
PGP? key so i cant auth with assbot myself anymore
assbot: Logged on 22-08-2015 19:30:03; mircea_popescu: the merit of a
pgp signature is that it delivers them from having to do this.
mircea_popescu: the merit of a
pgp signature is that it delivers them from having to do this.
☟︎ punkman: "Motherboard was given a contact email address for The Impact Team by an intermediary. After reaching out, the hackers replied with a message signed with the same
PGP key posted with the Ashley Madison dumps. " << of course they couldn't provide the signed replies
phf: one can buy "
PGP Source Code and Internals." from amazon for $289
mircea_popescu: anyway, there's no question left that a usable extant
pgp implementaton exists. this should be redone.
mircea_popescu: deep restructuring of the
pgp implementation is required anyway.
punkman: "oh yeah let's be compatible to
PGP 4, because that matters"
trinque: what I mean by header is perhaps no more than: -----BEGIN
PGP SIGNED MESSAGE-----
ahmed_bodi: Occasional trader. remember trading with a few people here. lost my
PGP? key so i cant auth with assbot myself anymore
☟︎ ascii_field: mega-related. no
pgp, no wot. no wot, eaten alive by influence agents and provocateurs.
mircea_popescu: the correct solution is to reimplement
pgp and make it behave re clearsign.
jurov: but it's hopelessly complicated and no afaik one even tried do send
PGP/MIME message to mailing list
assbot: No valid OpenPGP data found on
pgp.mit.edu.
assbot: Searching
pgp.mit.edu for key with fingerprint: 4A0363951AFA090B6C221787E2F23DB84A63EC22. This may take a few moments.
mircea_popescu: but it is apparent, from the apoplectic reactions, and glaring when you look at the shards together, that the same jerking around is both behind the openbsd story and the
pgp story.
mircea_popescu: asciilifeform well obviouisly nobody ever used
pgp for any serious purpose.
jurov: asciilifeform: yo want to stream
pgp signed stuff_
mircea_popescu: we sadly have been overtaken by events in this point. i'd have much preferred to start work on this after the decanter work for "new
pgp" was done.
mircea_popescu: current computer science favours the speed of light over other speeds "much more important to "us"". it is a serious fucking problem for usg/nsa/alphabetsoup that there still exist people who even vaguely understand what this shit even is, because even one in a million that can make actual decisions based on actual facts when that asshole asciilifeform publishes things about
pgp keys or that asshole mircea_popescu thre
mats: Maintains the strong set, displays some statistics as to it in the manner of Penning's thing [
http://pgp.cs.uu.nl] <<
assbot: Logged on 21-04-2015 11:41:31; mircea_popescu: and then $ gpg --keyserver sks-keyservers.net --send-key <KEYID> and $ gpg --keyserver
pgp.mit.edu --send-key <KEYID> where keyid you just copy from the line above.
assbot: Searching
pgp.mit.edu for key with fingerprint: DEF6F884324D1E384DC09C97F2CBD75211F125B2. This may take a few moments.
wywialm: considering it, but sane in-browser
pgp is not straightforward
wywialm: ben_vulpes, the application is currently a standalone python app, not a web browser app. We are working on a convenient in-browser app that would work with
PGP pete_dushenski: Guest96371: btw where's your
pgp key this fine evening ? y'know you can auth and self-voice with assbot eh
mircea_popescu: "guy with a
pgp key and a bmezine archive" = cypherpunk
wywialm: from the security perspective, it is based on the MPEx
PGP standard
assbot: Logged on 06-08-2015 21:28:06; ascii_field: checking can be done on a keyless
pgp mircea_popescu:
http://log.bitcoin-assets.com/?date=06-08-2015#1228030 << to expound on this for the log readership : it is not trivial but definitely feasible to cause any running implementation of asymmetric cryptography to leak key bits if it is possible to direct encrypted matter at it in an automatic fashion and have live access to the results somehow. this theoretical fact is practically verified for
pgp, and there's no grounds
☝︎☟︎ mike_c: html and
pgp don't mix
mircea_popescu: do not expect a girl with a collar is actually a slave - she probably thought it looks good for her facebook ; do not expect someone with a
pgp key is a lord - they probably were just trying to impress someone.
a3voices: cool well now I have a
pgp key for the first time
BingoBoingo: ben_vulpes:
pgp.mit.edu was a gold mine for academic keys they may not have made the transition to sks. I retrieved manually though by schoool.
nubbins`: i coulda SWORN i just typed in my
pgp passphrase completely and utterly wrong
ascii_field: the original was, iirc, used to sign winblowz
pgp updates
popmechanic: Apparently they just offer email addresses? Not sure, first time I’ve used the service. I totally understand and am prepared to agree with a predjudice against a service like this, because they’re going to end up sitting on private keys. But it’s optional, and actually a pretty handy way to manage a few aspects of
PGP management.
assbot: Searching
pgp.mit.edu for key with fingerprint: 48802F831BAFC232A26C974A0DA5926BC6E7BDCF. This may take a few moments.
ascii_field: (they don't appear to believe in
pgp, so i cannot say if authentic)
nubbins`: phuctor is smashing numbers together, right now, churning through huge data sets of
pgp keys
phillipsjk: I really should auth with the bot with
pgp though.
cazalla: meh i just saw
pgp in the headline, read it and thought perhaps might appeal to others here
assbot: Logged on 10-07-2015 20:21:42; ascii_field: my point is that if i, or mats, write to, e.g., saudi, offering ht work, will be laughed out of the room; and, since these twits don't believe in
pgp, we'd get a visit from gasenwagen the next day
ascii_field: my point is that if i, or mats, write to, e.g., saudi, offering ht work, will be laughed out of the room; and, since these twits don't believe in
pgp, we'd get a visit from gasenwagen the next day
☟︎ ascii_field: let's suppose they traded
pgp keys and can communicate securely. however, they cannot prevent the enemy from delaying messages
mats: le
pgp key server almost done cooking
ascii_field: the only reason to do this, other than
pgp-hardened out of band syncs, is to make your bitcoind walk the same logic path as other fella's