mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

593
comptes actifs

#openpgp

1 message1 participant1 message aujourd’hui

News from the coalface:

Upgrading the #Hockeypuck #openpgp #keyserver in-place has historically not been a smooth experience. In particular, the search indexes are only updated on write during normal operation, and the database schema is not updated at all. When major changes are made to the back end code, the dataset therefore has to be dumped and reloaded. This requires double the disk space and adds to the burden of maintaining a keyserver.

In preparation for #rfc9580 and #pqc keys, we have been working on in-place migrations for the search indexes and database schemas. The hockeypuck master branch now reindexes search terms transparently on startup, which will ensure consistent search results after any changes to the indexing policy. We are also testing a feature to reload the full dataset in-place after an upgrade, which must be run in offline mode due to concurrency limitations, but should otherwise be seamless and does not affect resource usage. Together these changes will reduce the maintenance burden for keyserver operators, and smooth the path for future upgrades.

In-place post-upgrade migrations, plus improved sync resilience, and hopefully a few additional improvements (watch this space!), will be available in the forthcoming 2.3 release, which is generously supported by @NGIZero Core.

A new report (commissioned by the German BSI) outlines the recent evolution of the #OpenPGP standard, including the new RFC 9580 and PQC drafts, as well as the spinoff "LibrePGP" draft that the GnuPG project writes.

PDF: github.com/crypto-security-too

(Announcement email: mailarchive.ietf.org/arch/msg/)

Note that the document contains a one-page "Executive Summary", which (although quite technical) is worth a read.

[TL;DR: It raises concerns about the GnuPG draft's development process, as well as quality]

The amazing openpgp-card-tools(1) and openpgp-card-ssh-agent(2) compile and work perfectly fine on FreeBSD 14.3-RELEASE.

Can properly use my OpenPGP card to authenticate against SSH servers and use oct to manage my cards.

The only preperations, I had to make in order for it to work:

pkg install pcsc-lite pcsc-tools ccid
sysrc pcscd_enable="YES"

Amazing! I love those utilities from @hko

1: crates.io/crates/openpgp-card-
2: crates.io/crates/openpgp-card-

#freebsd#openpgp#rust

I just learned that when encrypting email with PGP, the subject line of the email is NOT encrypted. Two things about this fascinate me:

- what a glaring oversight. How did anyone ever think that not encrypting the subject line was a good idea

- why is this not more commonly known? i feel like every guide how to use PGP for email should be screaming from the rooftops: "TAKE NOTE THAT THE SUBJECT LINE OF YOUR EMAILS IS NOT ENCRYPTED". Instead, I just found it deep in the details of one such guide. Many guides (yes I checked several) don't include this information at all.

#OpenPGP#PGP#GPG

Comparing #XMPP against #email protocols is too limited. What sets #deltachat apart is *vertical integration* and being driven by UI/UX considerations. Cross-platform Apps and Bots use the Rust core library which connects with #chatmail relays and classic email servers based on a higher level API -- abstracting over SMTP, MIME, #OpenPGP etc. See chatmail.at

#webxdc apps in turn use an even higher level stable API abstracting over email/xmpp/... see webxdc.org/docs/

chatmail.atChatmailChatmail provides FOSS infrastructure for interoperable, secure, speedy and reliable end-to-end encrypted messaging. Check out clients as Arcane Chat, Bots or Delta Chat today!

I just released version 0.1.2 of rsop-oct, a stateless #OpenPGP ("SOP") CLI tool for use with OpenPGP card hardware devices:

crates.io/crates/rsop-oct/

Like its sibling project #rsop, rsop-oct is based on @rpgp

This update makes integration with crates.io/crates/openpgp-card- optional.

rsop-oct can now implicitly use persisted PINs via openpgp-card-state, or explicitly provided ones via the standard SOP CLI parameter '--with-key-password'.

For more on #SOP, see datatracker.ietf.org/doc/draft

crates.iocrates.io: Rust Package Registry

New release: #rPGP version 0.16.0 🧰🔐✨

github.com/rpgp/rpgp/releases/

#OpenPGP implemented in pure #Rust, permissively licensed

This release features streaming message support: Now rPGP can process arbitrarily large messages, with modest memory requirements.

It adds experimental support for the upcoming OpenPGP #PQC IETF standard datatracker.ietf.org/doc/html/

This release also brings various improvements for key generation, support for X448/Ed448, and many minor fixes.

GitHubRelease v0.16.0 - Stream the world & PQC · rpgp/rpgp⛰️ Features Update to draft-ietf-openpgp-pqc-10 (#565) - (01a9643) 🚜 Refactor Cleanup the interface of crypto::*::SecretKey - (45e1ea8)

our friends over at @rpgp just published a monster milestone, humbly tagged 0.16 😍 with

- streaming decryption and encryption

- post-quantum-cryptography

- API streamlining.

#rPGP is a full Rust implementation of #openpgp which counts among the fastest and most compliant implementations today, and includes security audits. Note: #deltachat uses a restricted subset of OpenPGP, and follows best practices (eg using the same ed25519 keys implementation as #signal) github.com/rpgp/rpgp/

GitHubGitHub - rpgp/rpgp: OpenPGP implemented in pure Rust, permissively licensedOpenPGP implemented in pure Rust, permissively licensed - rpgp/rpgp

Don't use PGP with emails.

> Security researchers are sounding the alarm over a fresh flaw in the JavaScript implementation of OpenPGP (OpenPGP.js) that allows both signed and encrypted messages to be spoofed.

> Discovered by Codean Labs' Edoardo Geraci and Thomas Rinsma, the vulnerability essentially undermines the core purpose of using public key cryptography to secure communications.

**OpenPGP.js bug enables encrypted message spoofing**

theregister.com/2025/05/20/ope

The Register · Freshly discovered bug in OpenPGP.js undermines whole point of encrypted commsPar Connor Jones

I'm launching a new site about #OpenPGP:

openpgp.foo/

This site is a personal writing project with a focus on learning OpenPGP's concepts by playful hands-on use.

My goal is to empower readers to make sense of more advanced material (including openpgp.dev/), and become proficient in whatever subset of OpenPGP they are interested in.

The site is far from complete, I hope to continue writing on it. Let me know what you think, and what additional content you'd like to see!

🎬 When Code Became a Weapon

It's easy to take strong encryption for granted, but that hasn't always been the case. This week we're diving into the "Crypto Wars," covering historical attempts by the US government to restrict strong encryption being exported internationally.

privacyguides.org/videos/2025/

Let us know what you think of this style of video! We're trying something different, and this is the first in a planned series lined up 😄