New Hampshire Crossing
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Conversation:

Notices

  1. kat (boneidol)'s status on Sunday, 30-Jun-2019 07:39:51 EDT kat kat
    Remote profile options...
    oh Shit... the GPG web of trust is dead https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
    Sunday, 30-Jun-2019 07:39:51 EDT from indy.im permalink
    1. Joshua Judson Rosen (rozzin)'s status on Monday, 01-Jul-2019 15:40:24 EDT Joshua Judson Rosen Joshua Judson Rosen
      Remote profile options...
      @boneidol The signature-flooding attack on the SKS #keyservers (and DoS of their users) is bad but doesn't actually sound like any kind of #apocalypse, and has basically nothing to do with the #WoT; signature-chains maybe, but that's something else entirely. !crypto
      Monday, 01-Jul-2019 15:40:24 EDT from status.hackerposse.com permalink
      1. kat (boneidol)'s status on Tuesday, 02-Jul-2019 05:24:18 EDT kat kat
        Remote profile options...
        @rozzin Maybe I am misunderstanding, but the poisoning prevents people from updating keys to check trust paths. The proposed replacement service https://keys.openpgp.org/ does not link ID ( email address) to the public key, unless asked to.  And more importantly from a WoT is does not have any third party signatures.  So can't be used to follow a trust path
        Tuesday, 02-Jul-2019 05:24:18 EDT from indy.im permalink
        1. kat (boneidol)'s status on Tuesday, 02-Jul-2019 05:32:16 EDT kat kat
          Remote profile options...
          @rozzin https://keys.openpgp.org/about/faq  https://indy.im/attachment/138122
          Tuesday, 02-Jul-2019 05:32:16 EDT from indy.im permalink
        2. Joshua Judson Rosen (rozzin)'s status on Tuesday, 02-Jul-2019 08:12:09 EDT Joshua Judson Rosen Joshua Judson Rosen
          Remote profile options...
          Contrary to popular belief, "trust paths" are not actually a thing in #PGP.
          Tuesday, 02-Jul-2019 08:12:09 EDT from status.hackerposse.com permalink
          1. kat (boneidol)'s status on Tuesday, 02-Jul-2019 08:38:09 EDT kat kat
            Remote profile options...
            @rozzin help me out!
            what am I doing then when I get a new key from someone I've not communicated with, and check the signatures to see if there are any people in common ? 

            What are the people at Tails doing here ?  https://tails.boum.org/install/linux/usb-download/index.en.html#install-inc-steps-download.inline.web-of-trust  https://indy.im/attachment/138158

            It looks to me like building a human connection through the WoT 
            Tuesday, 02-Jul-2019 08:38:09 EDT from indy.im permalink
            1. Joshua Judson Rosen (rozzin)'s status on Wednesday, 03-Jul-2019 00:33:56 EDT Joshua Judson Rosen Joshua Judson Rosen
              Remote profile options...
              There is a chance I've misunderstood what you mean when you say "trust paths" if by "path" you didn't mean "linked lists that may be >1 indirection long". If so, sorry!☺
              Wednesday, 03-Jul-2019 00:33:56 EDT from status.hackerposse.com permalink
            2. Joshua Judson Rosen (rozzin)'s status on Wednesday, 03-Jul-2019 00:49:32 EDT Joshua Judson Rosen Joshua Judson Rosen
              Remote profile options...
              That #PGP's #WoT metrics (supposedly) propagate through signature-chains is somehow basically an extremely popular #myth; "talks about WoT being all about arbitrarily-long multi-hop chains of trust" and "conflates #trust and #identity #certification" have been "understands-pgp-p" litmus tests for me since I realized how confused *I was myself* years ago, and they've never failed before.
              Wednesday, 03-Jul-2019 00:49:32 EDT from status.hackerposse.com permalink
            3. Joshua Judson Rosen (rozzin)'s status on Wednesday, 03-Jul-2019 00:56:58 EDT Joshua Judson Rosen Joshua Judson Rosen
              Remote profile options...
              It may also matter that when I say "#PGP", I really mean "#GnuPG" because AFAICT GPG is the PGP that everyone actually uses these days. There are "trust signatures" in #OpenPGP, and GPG can make and use them..., but they're a whole different thing from "trust", "signatures", and #WoT. And I don't think I've ever actually seen one in the wild. Some other PGP implementation might use tsigs by default? But I doubt it?
              Wednesday, 03-Jul-2019 00:56:58 EDT from status.hackerposse.com permalink
            4. Joshua Judson Rosen (rozzin)'s status on Wednesday, 03-Jul-2019 01:15:55 EDT Joshua Judson Rosen Joshua Judson Rosen
              Remote profile options...
              That #Tails "use the WoT" download #verification guide is telling you to do 2 distinct things:
              1) use #PGP WoT metrics to identify someone who is a Tails developer (but not AFAICT to identify that person *as* a Tails developer);
              2) make a WoT-less leap from "this is Bob" to "Bob is verified as a Tails developer AND his signatures mean something".

              In that "→A→B→C" chain of mixed ops, #WoT only takes you to B.
              Wednesday, 03-Jul-2019 01:15:55 EDT from status.hackerposse.com permalink
            5. Joshua Judson Rosen (rozzin)'s status on Wednesday, 03-Jul-2019 10:32:33 EDT Joshua Judson Rosen Joshua Judson Rosen
              Remote profile options...
              So, "what am I doing when I get a new key from someone and check the signatures to see if there are any people in common" depends heavily on what you mean by "check the signatures" and "people in common". If you mean "trace through signature-chains with no #trust #metrics to find *reachable* signatures", then no you're not using #WoT verification, you're making your own inferences based on something else.
              Wednesday, 03-Jul-2019 10:32:33 EDT from status.hackerposse.com permalink
    2. Joshua Judson Rosen (rozzin)'s status on Monday, 01-Jul-2019 15:42:36 EDT Joshua Judson Rosen Joshua Judson Rosen
      Remote profile options...
      Also it seems kind of inappropriate to be using "poisoning" as its being used here: https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f !crypto
      Monday, 01-Jul-2019 15:42:36 EDT from status.hackerposse.com permalink
    3. Joshua Judson Rosen (rozzin)'s status on Monday, 01-Jul-2019 15:50:40 EDT Joshua Judson Rosen Joshua Judson Rosen
      Remote profile options...
      ALSO, I'm reminded that there was this other #HKP #keyserver released a few years ago, compatible w/ #SKS but written in #Golang, which might relieve some of "zomg unmaintainable!" problems with the SKS servers: https://hockeypuck.github.io/ !crypto #PGP #GnuPG
      Monday, 01-Jul-2019 15:50:40 EDT from status.hackerposse.com permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

New Hampshire Crossing is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All New Hampshire Crossing content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.