Along with about half of you I'm in CS 465 right now (Computer
Security), and since we're working on cryptography right now, I'm now
paranoid about the weakness of 1024 bit keys.  It's pretty absurd that
that's the default, and a lot of poor gullible guys like me just went
along with it.

Anyway, I just made a new 4096 bit key which should hopefully be long
enough for the next two years or so.  It took a few minutes to get
enough entropy to make the key, but it was worth it.

This message should be signed with my new key, which I have signed with
my old key and uploaded to a keyserver or two.  If you have any problems
let me know.  Otherwise, I'll go ahead and revoke my old key in a few
days.

I hear there's talk of having a PGP key-signing party in the near
future, and I think that that's a great idea.  It's great to have a
solid web of trust, and even more importantly, I think it's great to
teach people about security who have never had experience with the
sometimes cryptic interface of GPG.

Attachment: pgp00000.pgp
Description: PGP signature

____________________
BYU Unix Users Group 
http://uug.byu.edu/ 
___________________________________________________________________
List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list

Reply via email to