Cryptography Bookmarks

Securing email and instant messengers.

​#Bookmarks ​#Cryptography

Email has staying power, because users are in control (at least, they have more control than with centralized walled gardens). It has been around since the birth of the Internet nearly half a century ago. And, it is closest thing we’ve got to long-term messaging infrastructure. – Yes, We Want Cryptographic Protection for Email

Yes, We Want Cryptographic Protection for Email

OK, this is hilarious (in German). Threema set up an ice cream stand with free ice cream, but the salesperson asks people intimate questions before they get the ice cream: your phone number, your best friend’s name, your best friend’s birth year, whether you’re undergoing any medical treatments, who you chatted with last… Versteckte Kamera: Eiscreme mit Daten bezahlen

Versteckte Kamera: Eiscreme mit Daten bezahlen

@yarmo figured out what my Keyoxide problem was.

@yarmo

… it appears ElGamal is not recommended to be used … For encryption, it is recommended to create a new subkey with ed25519 or cv25519!” – Could not find valid encryption key packet in key … Subkey is expired ​#139

Could not find valid encryption key packet in key … Subkey is expired ​#139

But I think I’ve got to wait… I currently have GPG 2.2.12 which doesn’t offer these.

Note that certification and authentication keys use signature algorithms internally, thus for our key, we’ll use ed25519 for all but our encryption subkey which will instead use cv25519. – An abridged guide to using ed25519 PGP keys with GnuPG and SSH

An abridged guide to using ed25519 PGP keys with GnuPG and SSH

Local infrastructure:

A guide on building autonomous communication networks with LoRa that work without wider communications infrastructure. Combining techniques for resistance, resilience, and persistence. … "Revolutionary action to build autonomous infrastructure - autonomous infrastructure to help with revolutionary action." ��� Building Autonomous, Off-Grid, Encrypted, and Solar Powered Communications Infrastructure

Building Autonomous, Off-Grid, Encrypted, and Solar Powered Communications Infrastructure