PGP: Difference between revisions

From Noisebridge
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
Here are a list of members/guests that use PGP keys and would be happy to do a signing with you if you find them in the space. Please add yourself to the list if you'd like to do this too. Key signings could happen after our Tuesday meetings.
Here are a list of members/guests that use PGP keys and would be happy to do a signing with you if you find them in the space. Please add yourself to the list if you'd like to do this too. Key signings could happen after our Tuesday meetings.
PGP is an open standard for encrypted and authenticated communications using computers.  You can use PGP to make sure your communications and data can't be decoded in-transit across the internet or on disk by anyone except the intended recipient.  Another feature of PGP is that messages that you sign with your public key can be mathematically proven to have come from you (because only you possess your private key).
Some people believe that all communications (including email) should be encrypted with PGP, but if you want to send a message to someone with PGP you need their public key.  People who use PGP want their public key to be widely known, so they post them online on keyservers.  They include the "fingerprint" of their public key (like 1AEF90F4) on their business card and in emails, so you can confirm that the public key you have for them is the right one.
If someone sends a plaintext
If you


* [[User:rubin110|rubin110]] - 1AEF90F4 - [http://rubin.starset.net/pgp.txt key]
* [[User:rubin110|rubin110]] - 1AEF90F4 - [http://rubin.starset.net/pgp.txt key]

Revision as of 21:04, 27 January 2013

Here are a list of members/guests that use PGP keys and would be happy to do a signing with you if you find them in the space. Please add yourself to the list if you'd like to do this too. Key signings could happen after our Tuesday meetings.

PGP is an open standard for encrypted and authenticated communications using computers. You can use PGP to make sure your communications and data can't be decoded in-transit across the internet or on disk by anyone except the intended recipient. Another feature of PGP is that messages that you sign with your public key can be mathematically proven to have come from you (because only you possess your private key).

Some people believe that all communications (including email) should be encrypted with PGP, but if you want to send a message to someone with PGP you need their public key. People who use PGP want their public key to be widely known, so they post them online on keyservers. They include the "fingerprint" of their public key (like 1AEF90F4) on their business card and in emails, so you can confirm that the public key you have for them is the right one.

If someone sends a plaintext

If you

  • rubin110 - 1AEF90F4 - key
  • saizai - D6D408A9 - key
  • Michiexile/DrSyzygy - C07CCCCD - key
  • User:Glen Jarvis - 42CE11B6 - key (could someone help me test?)
  • Rachel - but I have to figure out again how all this shit works, I have a key Somewhere, blah blah
  • jof - 0x8F8CAD3D - Key is on my user page
  • Schoen - 9C7DD150 - key
  • Filip - Need to dig up and dust off, but interested in getting some networking going. Discuss infrastructure? Could we get a six-degrees/small-world thing going via other hackerspaces?
  • Danny - 0xA3FDE45E [1]
  • mrdomino - Need to find some more bits first
  • Tom - 80AF07D3 - Happy to sign keys any time, just catch me on email/IM or in the space.