report: https://bitcointalk.org/index.php?topic=205349.0
Every talk will be widely witnessed and videotaped so we can get some
reasonably good security by simply putting out PGP fingerprints in our
slides. Yeah, some fancy attacker could change the videos after the
fact, but the talks themselves
On 14 May 2013 20:41, Peter Todd p...@petertodd.org wrote:
report: https://bitcointalk.org/index.php?topic=205349.0
Every talk will be widely witnessed and videotaped so we can get some
reasonably good security by simply putting out PGP fingerprints in our
slides. Yeah, some fancy attacker
On Tue, May 14, 2013 at 09:16:28PM +0200, Melvin Carvalho wrote:
FWIW I take this stuff pretty seriously myself. I generated my key
securely in the first place, I use a hardware smartcard to store my PGP
key, and I keep the master signing key - the key with the ability to
sign other keys -
On Tue, May 14, 2013 at 9:16 PM, Melvin Carvalho
melvincarva...@gmail.com wrote:
Just out of curiosity, could PGP keyservers suffer from a similar 51% attack
as the bitcoin network?
Well, no, and yes. It doesn't work like that.
If you have your own domain, you can store your key there as a TXT
On Tue, May 14, 2013 at 09:39:46PM +0200, Harald Schilly wrote:
If you have your own domain, you can store your key there as a TXT entry.
$ dig +short harald._pka.schil.ly. TXT
and even use it automatically:
$ gpg … --auto-key-locate pka -r email@address.domain
Nice. But we all kow about the
5 matches
Mail list logo