digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

807
active users

#keyservers

0 posts0 participants0 posts today

A nice thing about #Manjaro is that it holds back updates for a week. I see Manjaro haters roll out this fact like it's a bad thing. Whatever. Here's the "fun" part of all this: I didn't need to do it. The problem isn't #Majaro, there's something wrong with #Arch mirrors and #keyservers. Huge swaths of the mirrors are inaccessible. Keyservers are also often unavailable. Why? Who the fuck knows. So, I have a tarted up Arch install that may or may not update correctly. Oh, and I installed KDE because connecting to a sever to download something else wasn't working at the time. That's my #Linux Spring Adventure. 4/4

First steps towards more robust sync!

#Hockeypuck’s dataset normalisation rules (or “filters”) were updated between v2.1 and v2.2, meaning that #SKS recon did not work between #openpgp #keyservers running the older and newer versions. The keyservers could not all be updated simultaneously, and a few keyservers still run v2.1 today for compatibility reasons, so we had to find a way to prevent the network from split-braining.

The quick and dirty solution was a small script that runs on each side of the filter discontinuity, polls for local changes, and submits them to the other side over HKP (the protocol your #PGP client uses). But this is effectively the same idea as the old PKS sync model, just over HTTP(S) instead of email. And sks-keyserver used to support PKS-over-email, so shouldn’t hockeypuck be able to do PKS-over-HTTP natively?

The short answer is, it can! It was long intended for hockeypuck to support PKS email, but only a fraction of the necessary code was written, and there were no tests. Today, the pgpkeys test swarm has just performed its first sync using the completed PKS code, which supports *both* HTTP and email transport.

It’s not ready for production yet though. Further testing is required, and then the second part of the PKS code can be written: automatic failover from SKS to PKS when filter mismatch is detected (and just as importantly, automatic fail*back*).

This will mean that keyserver operators will be able in the future to upgrade across filter discontinuities without risking a split brain scenario. It should also mean that key updates submitted to the hockeypuck network could be automatically synced to @keys_openpgp_org … watch this space! 😎

(Hockeypuck v2.3 development is kindly supported by @NGIZero Core)

Replied to xeniax ⏚

@Xeniax Totally nerdsniped :D I'd love to be a part of the study.

I don't think that #KeyServers are dead. I think they evolved into Verifying Key Servers (VKS), like the one run by a few folks from the OpenPGP ecosystem at keys.openpgp.org/about . More generally, I believe that #PGP / #GPG / #OpenPGP retains important use-cases where accountability is prioritized, as contrasted with ecosystems (like #Matrix, #SignalMessenger) where deniability (and Perfect Forward Secrecy generally) is prioritized. Further, PGP can still serve to bootstrap those other ecosystems by way of signature notations (see the #KeyOxide project).

Ultimately, the needs of asynchronous and synchronous cryptographic systems are, at certain design points, mutually exclusive (in my amateur estimation, anyway). I don't think that implies that email encryption is somehow a dead-end or pointless. Email merely, by virtue of being an asynchronous protocol, cannot meaningfully offer PFS (or can it? Some smart people over at crypto.stackexchange.com seem to think there might be papers floating around that can get at it: crypto.stackexchange.com/quest).

To me, the killer feature of PGP is actually not encryption per se. It's certification, signatures, and authentication/authorization. I'm more concerned with "so-and-so definitely said/attested to this" than "i need to keep what so-and-so said strictly private/confidential forever and ever." What smaller countries like Croatia have done with #PKI leaves me green with envy.

keys.openpgp.orgkeys.openpgp.org
Continued thread

#survey #keyservers #pgp #encryption

PART 3 OF THE KEYSERVER STUDY

(see Part 1 here: mastodon.ml/@Xeniax/1142733550)

❓QUESTION 3: WHY HAVE YOU STOPPED USING KEYSERVERS

Mastodon.mlxeniax ⏚ (@Xeniax@mastodon.ml)Dear Fedi friends. I want to make a short #survey to understand who actively uses #keyservers today. I am interested in understanding the meaning and the value that people attribute to keyservers nowadays, and the shift in perceptions of email #encryption 🔑🔒 📊 I will be making several polls (follow the thread!) 💌 I also would be happy if some of you agree to talk with me more in depth over an e2ee encrypted channel of your choice, no need to make a call, just messages are enough 👾 Feel free to share the polls and reach out in comments if you can and want to be part of this study. 👩🏽‍🎓 If this ever leads to any kind of publication, I will be following the standard ethical protocol adopted in the academic research community, which is to 1. ask informed consent for quoting; 2. quoting anonymously by default, unless the person wants to be named and 3. right to withdraw from the study even after responding to the questions QUESTION 1: DO YOU USE KEYSERVERS? [ ] Yes, actively (at least twice a month) [ ] Yes, sometimes (at least once every 2-3 months) [ ] I have used keyservers in the past but not anymore [ ] I have never used keyservers
Continued thread

#survey #keyservers

🔒🔑 PART 2 of the Keyservers Study
(see part 1 here: mastodon.ml/@Xeniax/1142733550)

❓QUESTION 2: HOW DO YOU MAINLY USE KEYSERVERS?

✨✨ if you have used them in the past, you can also answer here!

Mastodon.mlxeniax ⏚ (@Xeniax@mastodon.ml)Dear Fedi friends. I want to make a short #survey to understand who actively uses #keyservers today. I am interested in understanding the meaning and the value that people attribute to keyservers nowadays, and the shift in perceptions of email #encryption 🔑🔒 📊 I will be making several polls (follow the thread!) 💌 I also would be happy if some of you agree to talk with me more in depth over an e2ee encrypted channel of your choice, no need to make a call, just messages are enough 👾 Feel free to share the polls and reach out in comments if you can and want to be part of this study. 👩🏽‍🎓 If this ever leads to any kind of publication, I will be following the standard ethical protocol adopted in the academic research community, which is to 1. ask informed consent for quoting; 2. quoting anonymously by default, unless the person wants to be named and 3. right to withdraw from the study even after responding to the questions QUESTION 1: DO YOU USE KEYSERVERS? [ ] Yes, actively (at least twice a month) [ ] Yes, sometimes (at least once every 2-3 months) [ ] I have used keyservers in the past but not anymore [ ] I have never used keyservers

Dear Fedi friends. I want to make a short #survey to understand who actively uses #keyservers today. I am interested in understanding the meaning and the value that people attribute to keyservers nowadays, and the shift in perceptions of email #encryption 🔑🔒

📊 I will be making several polls (follow the thread!)

💌 I also would be happy if some of you agree to talk with me more in depth over an e2ee encrypted channel of your choice, no need to make a call, just messages are enough

👾 Feel free to share the polls and reach out in comments if you can and want to be part of this study.

👩🏽‍🎓 If this ever leads to any kind of publication, I will be following the standard ethical protocol adopted in the academic research community, which is to 1. ask informed consent for quoting; 2. quoting anonymously by default, unless the person wants to be named and 3. right to withdraw from the study even after responding to the questions

QUESTION 1: DO YOU USE KEYSERVERS?