Along with about half of you I'm in CS 465 right now (Computer Security), and since we're working on cryptography right now, I'm now paranoid about the weakness of 1024 bit keys. It's pretty absurd that that's the default, and a lot of poor gullible guys like me just went along with it.
Anyway, I just made a new 4096 bit key which should hopefully be long enough for the next two years or so. It took a few minutes to get enough entropy to make the key, but it was worth it. This message should be signed with my new key, which I have signed with my old key and uploaded to a keyserver or two. If you have any problems let me know. Otherwise, I'll go ahead and revoke my old key in a few days. I hear there's talk of having a PGP key-signing party in the near future, and I think that that's a great idea. It's great to have a solid web of trust, and even more importantly, I think it's great to teach people about security who have never had experience with the sometimes cryptic interface of GPG.
pgp00000.pgp
Description: PGP signature
____________________ BYU Unix Users Group http://uug.byu.edu/ ___________________________________________________________________ List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
