med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

326
active users

#openpgp

2 posts1 participant0 posts today
Delta Chat<p><a href="https://chaos.social/tags/Whatsapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whatsapp</span></a> on <a href="https://chaos.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> had a severe 0day that was exploited in the wild for some months, and is fixed with august 20th releases <a href="https://hackread.com/whatsapp-0-day-exploit-attack-targeted-ios-macos-users/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/whatsapp-0-day-ex</span><span class="invisible">ploit-attack-targeted-ios-macos-users/</span></a></p><p>Last year <a href="https://chaos.social/tags/signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>signal</span></a> also had its multi-device functionality exploited in the wild. <a href="https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/02/hack</span><span class="invisible">ers-exploit-signals-linked-devices.html</span></a></p><p>FWIW <a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deltachat</span></a> has a dumber multi-device sync model, no device linking, depends on being in the same WiFI for setup (therefore no easy remote exploits), and <a href="https://chaos.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> signatures and verification for ongoing usage (like all other E2EE messages).</p>
Delta Chat<p><span class="h-card" translate="no"><a href="https://gladtech.social/@avoca" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>avoca</span></a></span> Suggesting we give up or drop our efforts is a valid opinion, and we don't blame people for having it. There are shitloads of messengers, and why are we engaging in this crazy trip of using <a href="https://chaos.social/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a> and <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> for instant messaging, out of all things? We consider it progress if it's just a few percent opposing our effort and current trajectory at all. That surely was different some years ago where it felt more like 80% being in that "are you kidding me?" camp.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@osxreverser" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>osxreverser</span></a></span> I guess forcing everyone to use <a href="https://infosec.space/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> (or rather <a href="https://infosec.space/tags/enc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enc</span></a><a href="http://github.com/life4/enc/" rel="nofollow noopener" target="_blank">¹</a>) and <a href="https://infosec.space/tags/VeraCrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VeraCrypt</span></a> / <span class="h-card" translate="no"><a href="https://mastodon.social/@veracrypt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>veracrypt</span></a></span> <a href="https://veracrypt.io/en/Downloads.html" rel="nofollow noopener" target="_blank">²</a> and putting that on an (S) <a href="https://infosec.space/tags/FTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FTP</span></a> (S) server isn't an option?</p>
vanitasvitae<p><strong>Towards OpenPGP v6 in PGPainless</strong></p><p>I’m very excited to announce the results of what I have been working on for the past 1,5 years. *drumrolls*</p><p>I added support for OpenPGP v6 (rfc9580) in both Bouncy Castle and PGPainless! In this blog post, I want to go over the work in more details.</p><p><a href="https://warmwasserwerfer.de/2025/08/28/towards-openpgp-v6-in-pgpainless/" class="" rel="nofollow noopener" target="_blank">https://warmwasserwerfer.de/2025/08/28/towards-openpgp-v6-in-pgpainless/</a></p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://warmwasserwerfer.de/tag/encryption/" target="_blank">#encryption</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://warmwasserwerfer.de/tag/java/" target="_blank">#java</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://warmwasserwerfer.de/tag/openpgp/" target="_blank">#openpgp</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://warmwasserwerfer.de/tag/pgpainless/" target="_blank">#pgpainless</a></p>
Heiko<p>I edited and (slightly) expanded yesterday's thread about inspecting <a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> certificate status with <span class="h-card" translate="no"><a href="https://mastodon.social/@rpgp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rpgp</span></a></span> into a blog article:</p><p><a href="https://openpgp.foo/posts/2025-08-certificate-status/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openpgp.foo/posts/2025-08-cert</span><span class="invisible">ificate-status/</span></a></p><p><a href="https://floss.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GnuPG</span></a> <a href="https://floss.social/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a> <a href="https://floss.social/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a> <a href="https://floss.social/tags/CLI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CLI</span></a></p>
Heiko<p>I just released version 0.6.6 of rpgpie, an experimental high level API for <span class="h-card" translate="no"><a href="https://mastodon.social/@rpgp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rpgp</span></a></span>:</p><p><a href="https://crates.io/crates/rpgpie" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">crates.io/crates/rpgpie</span><span class="invisible"></span></a></p><p>The rpgpie library crate ships with the (also experimental) "rpgp" CLI tool, which can inspect certificates (aka "<a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> public keys") in two different ways:</p><p>- "show" prints the internal structure of a certificate without much interpretation<br>- "status" prints a summarized view, and applies OpenPGP validity semantics</p><p>Since this release, "status" can emit JSON.</p><p>🧵 1/5</p><p><a href="https://floss.social/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a> <a href="https://floss.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GnuPG</span></a></p>
heineloMein Desktop unter Fedora die Nutzung von Linux und Open Source Software mit entsprechenden Messengern und Mail Anwendungen und ohne Google / Microsoft / Apple und mit KI dann wenn ich sie haben möchte ist und bleibt einfach eine bessere und auch Nachhaltigerer und vor allem Selbs bestimmender Umgang mit Informationstechnologie.<br> <a href="https://pixelfed.social/discover/tags/DailyDesktop?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#DailyDesktop</a><br> <a href="https://pixelfed.social/discover/tags/ShareYourDesktop?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#ShareYourDesktop</a><br> <a href="https://pixelfed.social/discover/tags/UnixPorn?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#UnixPorn</a><br> <a href="https://pixelfed.social/discover/tags/fedora42?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#fedora42</a> <a href="https://pixelfed.social/discover/tags/gnulinux?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#gnulinux</a> <a href="https://pixelfed.social/discover/tags/Linux?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#Linux</a> <a href="https://pixelfed.social/discover/tags/mydesktop?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#mydesktop</a> <a href="https://pixelfed.social/discover/tags/opensource?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#opensource</a> <a href="https://pixelfed.social/discover/tags/fedora?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#fedora</a> <a href="https://pixelfed.social/discover/tags/libreoffice?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#libreoffice</a> <a href="https://pixelfed.social/discover/tags/fairphone4?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#fairphone4</a> <a href="https://pixelfed.social/discover/tags/murenacloud?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#murenacloud</a> <a href="https://pixelfed.social/discover/tags/evolution?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#evolution</a> <a href="https://pixelfed.social/discover/tags/digitaleselbstbestimmung?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#digitaleselbstbestimmung</a> <a href="https://pixelfed.social/discover/tags/onlyoffice?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#onlyoffice</a> <a href="https://pixelfed.social/discover/tags/digitaleselbstverteidigung?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#digitaleselbstverteidigung</a> <a href="https://pixelfed.social/discover/tags/digitalenachhaltigkeit?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#digitalenachhaltigkeit</a> <a href="https://pixelfed.social/discover/tags/signal?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#signal</a> <a href="https://pixelfed.social/discover/tags/telegram?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#telegram</a> <a href="https://pixelfed.social/discover/tags/Verschlüsselung?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#Verschlüsselung</a> <a href="https://pixelfed.social/discover/tags/openpgp?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#openpgp</a> <a href="https://pixelfed.social/discover/tags/rkhunter?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#rkhunter</a> <a href="https://pixelfed.social/discover/tags/lynis?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#lynis</a> <a href="https://pixelfed.social/discover/tags/firewall?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#firewall</a>
Lars Wirzenius<p>Any software that needs to encrypt data using OpenPGP, or to verify an OpenPGP signature on data, should use the stateless OpenPGP interface, or SOP, which is provided for a number of OpenPGP implementations. Using any other interface is going to lock in the software to that implementation.</p><p>Also, SOP is lovely to use from another program. It's designed to be nice to use from a program. </p><p><a href="https://openpgp.foo/learn/sop/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">openpgp.foo/learn/sop/</span><span class="invisible"></span></a></p><p><a href="https://toot.liw.fi/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> <a href="https://toot.liw.fi/tags/SOP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOP</span></a> <a href="https://toot.liw.fi/tags/StatelessOpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StatelessOpenPGP</span></a></p>
qbi<p><a href="https://freie-re.de/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a> bzw. genauer <a href="https://freie-re.de/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> gibt es in verschiedenen Standards:<br>- RFC 2440<br>- RFC 4880<br>- RFC 9580 und<br>- LibrePGP</p><p>Johannes Roth und Falko Strenzke haben die Unterschiede zwischen den wichtigsten Standards herausgearbeitet:<br><a href="https://github.com/crypto-security-tools/OpenPGP-LibrePGP-comparison" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/crypto-security-too</span><span class="invisible">ls/OpenPGP-LibrePGP-comparison</span></a></p><p><a href="https://freie-re.de/tags/rfc2440" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rfc2440</span></a> <a href="https://freie-re.de/tags/rfc4880" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rfc4880</span></a> <a href="https://freie-re.de/tags/rfc9580" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rfc9580</span></a> <a href="https://freie-re.de/tags/librepgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>librepgp</span></a></p>
Heiko<p>New blog article: "Using a second <a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> card for my primary key"</p><p><a href="https://openpgp.foo/posts/2025-07-a-second-card/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openpgp.foo/posts/2025-07-a-se</span><span class="invisible">cond-card/</span></a></p><p>This is a rather niche article, but I hope it will still contain some bits of interest, for at least some readers 🤓.</p><p>In it, I import my primary OpenPGP key onto a second OpenPGP card hardware device, and use the device to issue a third-party certification with rsop-oct.</p><p>I also outline some background and tradeoffs around different OpenPGP card setup.</p><p><a href="https://floss.social/tags/HSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HSM</span></a> <a href="https://floss.social/tags/OpenPGPcard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGPcard</span></a> <a href="https://floss.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GnuPG</span></a></p>
Heiko<p>A new report (commissioned by the German BSI) outlines the recent evolution of the <a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> standard, including the new RFC 9580 and PQC drafts, as well as the spinoff "LibrePGP" draft that the GnuPG project writes.</p><p>PDF: <a href="https://github.com/crypto-security-tools/OpenPGP-LibrePGP-comparison/releases/download/v1.4/opgp-lpgp-comp.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/crypto-security-too</span><span class="invisible">ls/OpenPGP-LibrePGP-comparison/releases/download/v1.4/opgp-lpgp-comp.pdf</span></a></p><p>(Announcement email: <a href="https://mailarchive.ietf.org/arch/msg/openpgp/2g_rjYBqwqKZE6OEgjNb0bFo098/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailarchive.ietf.org/arch/msg/</span><span class="invisible">openpgp/2g_rjYBqwqKZE6OEgjNb0bFo098/</span></a>)</p><p>Note that the document contains a one-page "Executive Summary", which (although quite technical) is worth a read.</p><p>[TL;DR: It raises concerns about the GnuPG draft's development process, as well as quality]</p>
Larvitz :fedora: :redhat:<p>Created a FreeBSD port for openpgp-card-tools and put it on my Codeberg: </p><p><a href="https://codeberg.org/Larvitz/openpgp-card-tools-freebsd-port" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/Larvitz/openpgp-c</span><span class="invisible">ard-tools-freebsd-port</span></a></p><p>It's a command-line-utility (oct), written in Rust, to manage openpgp smartcards and compatible devices (yubikey, nitrokey etc).</p><p>Usage instructions are in the repositories readme file.</p><p><a href="https://burningboard.net/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://burningboard.net/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> <a href="https://burningboard.net/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://burningboard.net/tags/port" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>port</span></a> <span class="h-card" translate="no"><a href="https://floss.social/@hko" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hko</span></a></span></p>
GnuPG<p>According to <span class="h-card" translate="no"><a href="https://social.heise.de/@ct_Magazin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ct_Magazin</span></a></span> and the press release <a href="https://merlinux.eu/press/2025-05-14-russia-deltachat.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">merlinux.eu/press/2025-05-14-r</span><span class="invisible">ussia-deltachat.pdf</span></a> Russia sues the German company merlinux GmbH over Delta Chat, an email and <a href="https://mstdn.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> based <a href="https://mstdn.social/tags/Endtoendcrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Endtoendcrypto</span></a> messenger.</p>
andre<p>Seit einiger Zeit signiere ich meine Mails mit OpenPGP.</p><p>Oft kommt die Rückmeldung: "Ich kann die Anhänge nicht öffnen."</p><p>Das ist sehr schade. Ich hätte gehofft, dass auch nicht IT-Nerds es schaffen, den Anhang mit Endung .asc zu ignorieren oder eine Suchmaschine dafür anwerfen.</p><p>Das Problem würde sich übrigens lösen, wenn öffentliche Stellen, Ärzte, Versicherung etc. auch verschlüsselte Mails nutzen würden.</p><p><a href="https://social.tchncs.de/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> <a href="https://social.tchncs.de/tags/verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>verschlüsselung</span></a> <a href="https://social.tchncs.de/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a></p>
Heiko<p>I just released version 0.7.1 of <a href="https://floss.social/tags/rsop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsop</span></a>, a stateless <a href="https://floss.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> ("SOP") CLI tool based on <span class="h-card" translate="no"><a href="https://mastodon.social/@rpgp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rpgp</span></a></span>:</p><p><a href="https://crates.io/crates/rsop/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">crates.io/crates/rsop/</span><span class="invisible"></span></a></p><p>This version adds support for the "merge-certs" SOP command, which consolidates multiple versions of a certificate into a unified aggregate view.</p><p>For more on <a href="https://floss.social/tags/SOP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOP</span></a>, see <a href="https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/draft</span><span class="invisible">-dkg-openpgp-stateless-cli/</span></a></p><p><a href="https://floss.social/tags/PGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PGP</span></a> <a href="https://floss.social/tags/GnuPG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GnuPG</span></a></p>
Delta Chat<p><span class="h-card" translate="no"><a href="https://det.social/@lostgen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lostgen</span></a></span> <span class="h-card" translate="no"><a href="https://sueden.social/@yuchungfink" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>yuchungfink</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> pretty correct but it's not gpg, the old command line tool but an audited state-of-the-art rust implementation for <a href="https://chaos.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> encryption. It has never been vulnerable to the various past flaws in gpg.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://23.social/@alios" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alios</span></a></span> no, but besides <a href="https://infosec.space/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> there are compatible interpretations like <a href="http://github.com/life4/enc/" rel="nofollow noopener" target="_blank"><code>enc</code></a> that just work!</p><ul><li><span class="h-card" translate="no"><a href="https://mastodon.social/@cacert" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cacert</span></a></span> was the better <span class="h-card" translate="no"><a href="https://infosec.exchange/@letsencrypt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>letsencrypt</span></a></span> but the <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAFAMs</span></a> cockblocked and actuvely sabotaged that by virtue of refusing to include the <a href="https://infosec.space/tags/CACert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CACert</span></a> Root-Certificate</li></ul>
alios<p>Are there any good alternatives to <a href="https://23.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> as gerneral purpose signature and encryption protocol thing with a "web of trust" idea in the back instead of hierarchical one like in <a href="https://23.social/tags/x509" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x509</span></a> ?</p><p><a href="https://23.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> does what it should do and i like packet approach. But imo it has become too complex in its try to stay backwards compatible an beeing "too generic" ...</p><p>just to be sure I'am not looking for an alternative to sign and encrypt emails but, a framework/protocol for distrib machine 2 machine communication</p>
Arch Linux :archlinux:<p>Automated digital signing of OS artifacts</p><p><a href="https://lists.archlinux.org/archives/list/arch-dev-public@lists.archlinux.org/thread/BOMYF4UTJJ37UIBXW52OU7WJTT3YPTKS/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lists.archlinux.org/archives/l</span><span class="invisible">ist/arch-dev-public@lists.archlinux.org/thread/BOMYF4UTJJ37UIBXW52OU7WJTT3YPTKS/</span></a></p><p><a href="https://fosstodon.org/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/RFC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RFC</span></a> <a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenPGP</span></a> <a href="https://fosstodon.org/tags/DigitalSignature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSignature</span></a> <a href="https://fosstodon.org/tags/Automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Automation</span></a> <a href="https://fosstodon.org/tags/Signstar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signstar</span></a> <a href="https://fosstodon.org/tags/NetHSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetHSM</span></a></p>
Gonçalo Valério<p>"CVE-2025-47934 – Spoofing OpenPGP.js signature verification"</p><p><a href="https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeanlabs.com/blog/research/c</span><span class="invisible">ve-2025-47934-spoofing-openpgp-js-signatures/</span></a></p><p><a href="https://s.ovalerio.net/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://s.ovalerio.net/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://s.ovalerio.net/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://s.ovalerio.net/tags/openpgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgp</span></a> <a href="https://s.ovalerio.net/tags/openpgpjs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openpgpjs</span></a></p>