social.bund.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Dies ist der Mastodon-Server der Bundesbeauftragten für den Datenschutz und die Informationsfreiheit (BfDI).

Administered by:

Server stats:

96
active users

#openpgp

0 posts0 participants0 posts today
Georg<p>Auch diesen Monat gibt es am 4ten Donnerstag eine <a href="https://digitalcourage.social/tags/CryptoParty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryptoParty</span></a> in <a href="https://digitalcourage.social/tags/Augsburg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Augsburg</span></a>. Thema ist diesmal: E-Mail-Verschlüsselung auf PC und Handy. Wie immer 19 Uhr (Donnerstag, 24.04.2025), im <a href="https://digitalcourage.social/tags/OpenLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenLab</span></a>, Bäckergasse 32.</p><p>Bringt bitte eure Freundinnen/Freunde mit. Eintritt frei. Keine Vorkenntnisse erforderlich.</p><p><a href="https://cryptoparty.in/augsburg" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cryptoparty.in/augsburg</span><span class="invisible"></span></a></p><p><a href="https://digitalcourage.social/tags/Medienkompetenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Medienkompetenz</span></a> <br><a href="https://digitalcourage.social/tags/Digitalisierung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Digitalisierung</span></a><br><a href="https://digitalcourage.social/tags/verschlusselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>verschlusselung</span></a><br><a href="https://digitalcourage.social/tags/Openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Openpgp</span></a></p>
l<p><span class="h-card" translate="no"><a href="https://mastodon.social/@eff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eff</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@evacide" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>evacide</span></a></span> <br>GnuPG is not the only way to encrypt email, I use <a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> with Thunderbird and <span class="h-card" translate="no"><a href="https://chaos.social/@delta" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>delta</span></a></span>, both don't use GPG.</p><p>Also pages<br><a href="https://ssd.eff.org/module/how-use-pgp-linux" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ssd.eff.org/module/how-use-pgp</span><span class="invisible">-linux</span></a><br>and<br><a href="https://ssd.eff.org/module/how-use-pgp-windows" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ssd.eff.org/module/how-use-pgp</span><span class="invisible">-windows</span></a><br>are outdated, Thunderbird now has built-in OpenPGP implementation and Enigmail does not work with the latest versions.</p>
Delta Chat<p>The downside of our project approach was that we often got experts being very dismissive on re-using email and <a href="https://chaos.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> ... and there still is some opposition which often subsides when actually trying <a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deltachat</span></a> and <a href="https://chaos.social/tags/chatmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chatmail</span></a>, looking at security audits and our strong usable security focus. </p><p>There may also be surprising upsides. The UK "Online Safety Bill" which attacks end-to-end encryption integrity seems to not apply for ... e-mail. Because everyone knows, e-mail is unencrypted, right? :)</p>
Em :official_verified:<p>New Privacy Guides article 🔑✨<br>by me: </p><p>If you are using a YubiKey, </p><p>you might get in some situations where you need to reset your key to factory default, and/or set up a backup of it on a spare key.</p><p>This tutorial will guide you <br>through each step to reset and back up your YubiKey successfully, with clear instructions and plenty of visual support.</p><p>I hope you find it helpful!</p><p><a href="https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">privacyguides.org/articles/202</span><span class="invisible">5/03/06/yubikey-reset-and-backup/</span></a></p><p><a href="https://infosec.exchange/tags/PrivacyGuides" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyGuides</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Yubico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yubico</span></a> <a href="https://infosec.exchange/tags/YubiKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YubiKey</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/OTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTP</span></a> <a href="https://infosec.exchange/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> <a href="https://infosec.exchange/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a></p>
Rivane Rasetiansyah<p>Initializing a new project - Interplanetary Markdown. Might explore a <a href="https://fosstodon.org/tags/Web3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Web3</span></a> (off-chain) approach later for a better experience, but for now, keeping it simple with good old <a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a>.</p><p>A censorship-resistant <a href="https://fosstodon.org/tags/Markdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Markdown</span></a> publishing platform, enabling seamless content distribution. Powered by the Interplanetary File System (<a href="https://fosstodon.org/tags/IPFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPFS</span></a>), ensuring <a href="https://fosstodon.org/tags/blogs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blogs</span></a>, <a href="https://fosstodon.org/tags/articles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>articles</span></a>, and other written content remain accessible and verifiable across the distributed web.</p><p><a href="https://github.com/rvnrstnsyh/cupoftea" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/rvnrstnsyh/cupoftea</span><span class="invisible"></span></a></p>
boredsquirrel<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@libreoffice" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>libreoffice</span></a></span> </p><p>The <a href="https://tux.social/tags/Libreoffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Libreoffice</span></a> Youtube channel is posting a lot of interesting talks from the "Libreoffice and <a href="https://tux.social/tags/Opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Opensource</span></a> Conference 2024"</p><p>Some of them:</p><p><a href="https://tux.social/tags/LuxChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LuxChat</span></a> for Governments: <a href="https://www.youtube.com/watch?v=JXdMKaEXq0Q" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=JXdMKaEXq0</span><span class="invisible">Q</span></a></p><p><a href="https://tux.social/tags/OpenDesk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenDesk</span></a> on <a href="https://tux.social/tags/OpenCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenCode</span></a>: <a href="https://www.youtube.com/watch?v=rVhAltODe-M" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=rVhAltODe-</span><span class="invisible">M</span></a></p><p><a href="https://tux.social/tags/Education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Education</span></a>: <a href="https://www.youtube.com/watch?v=V4fkWfuFXfo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=V4fkWfuFXf</span><span class="invisible">o</span></a></p><p><a href="https://tux.social/tags/Encrypted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encrypted</span></a> and <a href="https://tux.social/tags/Signed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signed</span></a> Documents (UI, with <a href="https://tux.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> or <a href="https://tux.social/tags/x509" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x509</span></a>): <a href="https://www.youtube.com/watch?v=W-qFr8tL-LE" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=W-qFr8tL-L</span><span class="invisible">E</span></a></p><p><a href="https://tux.social/tags/Matrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Matrix</span></a> <a href="https://tux.social/tags/Luxembourg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Luxembourg</span></a></p>
StefanOpenPGP.<br><br>Vielleicht, weil<br><br>1) Eine <a href="https://devlug.de/social?t=openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenPGP</a> Software (z.b. <a href="https://devlug.de/social?t=gnupg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#GnuPG</a>) nicht standardmäßig vorinstalliert ist<br>2) nicht alle Anbieter Web Key Directory (WKD) anbieten<br>3) Viele nicht wissen, dass es existiert und für was sie es gebrauchen könnten<br><br>CC: <span class="h-card"><a href="https://social.bund.de/users/bsi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@bsi@social.bund.de</a></span><br>
David Sardari<p><a href="https://fedifreu.de/tags/ePA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ePA</span></a> und <a href="https://fedifreu.de/tags/ePerso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ePerso</span></a> lasse/ließ ich gut abhängen. Wenn es nach einiger Zeit bekömmlich ist, lasse ich mich drauf ein.</p><p>Demnächst wird mein <a href="https://fedifreu.de/tags/Personalausweis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Personalausweis</span></a> erstmalig mit aktiver <a href="https://fedifreu.de/tags/ePerso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ePerso</span></a> Funktionalität ausgestellt, sodass mein <a href="https://fedifreu.de/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> Schlüssel endlich beglaubigt werden kann:<br><a href="https://pgp.governikus.de/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pgp.governikus.de/</span><span class="invisible"></span></a></p>
Gharbeia, Ⓐ<p>Ist es jemandem gelungen, seinen <a href="https://mastodon.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a>-Schlüssel über <a href="https://pgp.governikus.de" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pgp.governikus.de</span><span class="invisible"></span></a> mit <a href="https://mastodon.social/tags/AusweisApp2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AusweisApp2</span></a> zu zertifizieren?<br>Ich erhalte immer wieder die Fehlermeldung „Ausweisvorgang fehlgeschlagen“, die bei näherer Betrachtung intern als „Workflow_TrustedChannel_Server_Format_Error“ beschrieben zu werden scheint, da „PathSecurity-Protocol is no valid URI“</p><p><a href="https://mastodon.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> <a href="https://mastodon.social/tags/BSI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSI</span></a> <span class="h-card" translate="no"><a href="https://social.bund.de/@bsi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bsi</span></a></span></p>
samuel<p><span class="h-card" translate="no"><a href="https://social.bund.de/@bsi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bsi</span></a></span> digital signieren mit <a href="https://sueden.social/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a></p>
Pixelcode 🇺🇦<p>You may have noticed I updated my <a href="https://social.tchncs.de/tags/Keyoxide" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keyoxide</span></a> profile link in various places. That was legit – my old RSA <a href="https://social.tchncs.de/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> had expired back in early November without me noticing, and yesterday, I created a new <a href="https://social.tchncs.de/tags/ed25519" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ed25519</span></a> key. If you still see my old Keyoxide link somewhere, please tell me. <a href="https://social.tchncs.de/tags/pgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pgp</span></a> <a href="https://social.tchncs.de/tags/rsa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rsa</span></a></p><p>🔗 <a href="https://keyoxide.org/FEF07E34F003F58EF486E744A49FCA80F5B7DE61" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">keyoxide.org/FEF07E34F003F58EF</span><span class="invisible">486E744A49FCA80F5B7DE61</span></a></p><p>First, however, I had to manually update <a href="https://social.tchncs.de/tags/GPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG</span></a> 2.4 by compiling it from source. 🤡</p><p>🔗 <a href="https://www.procustodibus.com/blog/2023/02/gpg-2-4-on-ubuntu-22-04/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">procustodibus.com/blog/2023/02</span><span class="invisible">/gpg-2-4-on-ubuntu-22-04/</span></a></p><p>QT <a href="https://fed.brid.gy/r/https://bsky.app/profile/did:plc:dxkyhpbv4bsktz3x2yp6m2rz/post/3lcvpgpgnu22j" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fed.brid.gy/r/https://bsky.app</span><span class="invisible">/profile/did:plc:dxkyhpbv4bsktz3x2yp6m2rz/post/3lcvpgpgnu22j</span></a></p>
c't Magazin<p>heise+ | OpenPGP im Umbruch: Implementierungen, bessere Standards und ein großer Streit</p><p>Die OpenPGP-Community modernisiert E-Mail-Sicherheit, doch nach Streitigkeiten der Arbeitsgruppe entstehen nun zwei zueinander inkompatiblen Standards.</p><p><a href="https://www.heise.de/hintergrund/OpenPGP-im-Umbruch-Implementierungen-bessere-Standards-und-ein-grosser-Streit-9790850.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/OpenPGP-i</span><span class="invisible">m-Umbruch-Implementierungen-bessere-Standards-und-ein-grosser-Streit-9790850.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://social.heise.de/tags/Standards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Standards</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>"Passwort" Folge 2: Geheime Nachrichten</p><p>Im neuen Podcast von heise Security reden Christopher Kunz und Sylvester Tremmel über moderne und weniger moderne Lösungen zur sicheren Kommunikation.</p><p><a href="https://www.heise.de/news/Passwort-Folge-2-Geheime-Nachrichten-9745961.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Passwort-Folge-2</span><span class="invisible">-Geheime-Nachrichten-9745961.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> <a href="https://social.heise.de/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
BDM (BeautifulDowntownMannheim)<p>Hi <span class="h-card"><a href="https://xn--baw-joa.social/users/lfdi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lfdi</span></a></span> 👋. <span class="h-card"><a href="https://freude.social/users/alvar" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alvar</span></a></span></p><p>spricht etwas dagegen, euren öffentlichen <a href="https://squeet.me/search?tag=OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> Schlüssel auf <a href="https://keys.openpgp.org" rel="nofollow noopener noreferrer" target="_blank">keys.openpgp.org</a> zu laden und die E-Mail-Adresse zu verifizieren?</p><p>Eine Suche nach poststelle@lfd.bwl.de bringt aktuell leider keinen Treffer.</p><p>Klar, Schlüssel liegt unter <a href="https://www.baden-wuerttemberg.datenschutz.de/kontakt-aufnehmen" rel="nofollow noopener noreferrer" target="_blank">baden-wuerttemberg.datenschutz…</a> ab, aber einfacher wäre es, wenn er auch leicht vom Schlüsselserver zu beziehen wäre.</p><p>PS: Danke für euer Fediverse und PeerTube Angebot für Behörden und Verwaltungen im Land. Ohne das würde Stadt Mannheim vermutlich sonst immer noch nur auf Twitter rumgeistern 🤦</p>
Kevin Karhan :verified:<p>Hey, <span class="h-card" translate="no"><a href="https://social.bund.de/@BaFin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>BaFin</span></a></span> / <span class="h-card" translate="no"><a href="https://social.bund.de/@Bundesregierung" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Bundesregierung</span></a></span>, ist es gewollt dass eure <a href="https://www.bafin.de/SharedDocs/Kontaktdaten/DE/BaFin/Kontakt/Kontakt_BaFin_IF.html" rel="nofollow noopener noreferrer" target="_blank">"Abteilung Integrität des Finanzsystems" (IF) </a> keine <a href="https://infosec.space/tags/sichere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sichere</span></a> = <a href="https://infosec.space/tags/EndeZuEndeVerschl%C3%BCsselte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EndeZuEndeVerschlüsselte</span></a> <a href="https://infosec.space/tags/Kommunikation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kommunikation</span></a> ermöglicht? </p><p>Weil weder eure <a href="https://www.bafin.de/DE/DieBaFin/Kontakt/GesicherteKommunikation/gesicherte_kommunikation_node.html" rel="nofollow noopener noreferrer" target="_blank">Zertifikat-Selbstbedienung</a> noch eurer <a href="https://secmail.bafin.de/web.app" rel="nofollow noopener noreferrer" target="_blank">Keyserver</a> spucken mir den <a href="https://infosec.space/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a>-Key für diese aus...</p><p><a href="https://infosec.space/tags/getcertificate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getcertificate</span></a> <a href="https://infosec.space/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> <a href="https://infosec.space/tags/GPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG</span></a> <a href="https://infosec.space/tags/GnuPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GnuPG</span></a> <a href="https://infosec.space/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> <a href="https://infosec.space/tags/SicherKommiunikation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SicherKommiunikation</span></a> <a href="https://infosec.space/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://infosec.space/tags/Informationssicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Informationssicherheit</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a></p>
M. K. Broll<p>Immer mal wieder habe ich das Bedürfnis, privat verschlüsselte <a href="https://gruene.social/tags/eMails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eMails</span></a> per <a href="https://gruene.social/tags/openPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openPGP</span></a> zu verschicken. Nach 10 Jahren Pause habe ich mir mal wieder die Voraussetzungen dazu durchgelesen. Und nach einer halben Stunde den Deckel wieder zugeklappt. </p><p>Ich verstehe nicht, warum die EU nach 25 Jahren email-Verschlüsselung mit einem offenen Standard immer noch nicht zum Pflichtangebot für die Staaten mit seinen Behörden gemacht hat. Stattdessen gibt es in Deutschland das tote Pferd de-mail. Unfassbar.</p>
Jan<p>Gestern habe ich meinen <a href="https://social.tchncs.de/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> Schlüssel über den Anbieter <a href="https://social.tchncs.de/tags/Governikus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Governikus</span></a> beglaubigen lassen. Zuvor habe ich die <a href="https://social.tchncs.de/tags/AusweisApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AusweisApp</span></a> auf meinem Smartphone (App gibts in <a href="https://social.tchncs.de/tags/Fdroid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fdroid</span></a>!) und in <a href="https://social.tchncs.de/tags/Arch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arch</span></a> Linux installiert. Das war auch das erste Mal für mich, dass ich die Online-Ausweisfunktion von meinem <a href="https://social.tchncs.de/tags/Personalausweis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Personalausweis</span></a> benutzt habe. Hat gut und schnell funktioniert. Und die Beglaubigung war überdies kostenlos.</p><p><a href="https://pgp.governikus.de/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pgp.governikus.de/</span><span class="invisible"></span></a></p><p><span class="h-card" translate="no"><a href="https://social.bund.de/@bsi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bsi</span></a></span></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.bund.de/@hib_Nachrichten" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hib_Nachrichten</span></a></span> ja, dafür gibt's Standards wie <a href="https://mstdn.social/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a>/MIME &amp; <a href="https://mstdn.social/tags/OpenPGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenPGP</span></a> seit Ewigkeiren.</p>
PGPkeys EU<p>The project leader of <a href="https://infosec.exchange/tags/gnupg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnupg</span></a> has announced a fork of the <a href="https://infosec.exchange/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a> standard, justifying it with a list of accusations against the <a href="https://infosec.exchange/tags/IETF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IETF</span></a> working group that fall apart under scrutiny. <a href="https://infosec.exchange/tags/pgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pgp</span></a> is being threatened with destruction over a personal grievance. We strongly urge de-escalation.</p><p><a href="https://blog.pgpkeys.eu/critique-critique" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.pgpkeys.eu/critique-criti</span><span class="invisible">que</span></a></p>
PGPkeys EU<p>The pgpkeys.eu test swarm (a set of four containerised hockeypuck keyservers) is now running the hockeypuck 2.2 development branch, to test eventual consistency. Waiting to see if they will stabilise overnight. 🤞</p><p>Hockeypuck 2.2 will include several updates:</p><p>* drop support for deprecated algorithms (and therefore sync compatibility with sks-keyserver)<br>* drop support for images<br>* delete UIDs from hard-revoked keys<br>* implement timestamp-aware merge strategy<br>* experimental support for v5 and v6 <a href="https://infosec.exchange/tags/pgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pgp</span></a> keys</p><p>Dropping sks-keyserver backwards compatibility should get rid of several long-running sync issues. Hockeypuck validates self-sigs but sks-keyserver does not, and maintaining sync consistency with sks-keyserver means storing and propagating unverifiable self-sigs made with unsupported algorithms (in particular elGamal encrypt-and-sign and RSA1024, which are long deprecated). This has never worked reliably, and sks-keyserver compatibility is no longer a priority for the keyserver operators. Removing this support also significantly simplifies the code.</p><p>Dropping support for images will reduce the storage footprint of a keyserver, and will eliminate an obvious abuse vector. </p><p>Hard (i.e. retrospective) revocation of a key (e.g. by publishing the revocation certificate saved at key generation time) will cause all User IDs attached to that key to be deleted. This allows key owners to remove their personal information from the entire keyserver network without having to contact individual operators (which can still be done, your rights are not affected). </p><p>The timestamp-aware merge strategy will allow key owners to remove spammy third-party signatures from their published key by creating a fresh self-signature (e.g. by updating the expiry date) and republishing. This works similarly to attestation signatures, but is compatible with clients that don’t yet support attestations. </p><p>v5 (GnuPG) and v6 (RFC9760?) signatures will soon start appearing in the wild. Several changes will need to be made in the codebase to enable support to be added in the future.</p><p>These vital developments will help keep the <a href="https://infosec.exchange/tags/openpgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openpgp</span></a> keyserver network stable, relevant, and compliant, into the foreseeable future.</p>