eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

216
active users

#openpgp

4 posts4 participants0 posts today

Forschungsfrage:
Wenn ich alles mit KI ändern, generieren, anpassen, entfernen kann?
A) Wie sieht das mit
#Beweismitteln bei z.B. #Behörden aus?

Ja, wir leben schon in Zeiten v. Photoshop, KI kann hier aber deutlich mehr. Die Tools müssen dann auch für Privatpersonen ohne IT-Skills verwendbar/validierbar sein und wenn ich eine Anzeige erstatten müsste, will ich nich erst n' #DAW lernen müssen, um z.B. 'ne Tonspur validieren zu können. Ebenfalls wird "mach ein Screenshot mit der Website v. d. Atomuhr" nich´ mehr lange halten/bestand haben.
B) Wie kann "ich"/man ein "Selfmade-DIY" Foto noch als "echt" klassifizieren?
Klar könnte ich mit meinen #Openpgp key eine "Echtheit" beglaubigen, dass wäre aber allein von der Struktur falsch. Die PGP-Keys verifizieren nur, dass ich das Dokument signiert habe, nicht was ich signiert habe.
-
#It #security #cybersec #forensic #polizei #research

Comparing #XMPP against #email protocols is too limited. What sets #deltachat apart is *vertical integration* and being driven by UI/UX considerations. Cross-platform Apps and Bots use the Rust core library which connects with #chatmail relays and classic email servers based on a higher level API -- abstracting over SMTP, MIME, #OpenPGP etc. See chatmail.at

#webxdc apps in turn use an even higher level stable API abstracting over email/xmpp/... see webxdc.org/docs/

chatmail.atChatmailChatmail provides FOSS infrastructure for interoperable, secure, speedy and reliable end-to-end encrypted messaging. Check out clients as Arcane Chat, Bots or Delta Chat today!

I just released version 0.1.2 of rsop-oct, a stateless #OpenPGP ("SOP") CLI tool for use with OpenPGP card hardware devices:

crates.io/crates/rsop-oct/

Like its sibling project #rsop, rsop-oct is based on @rpgp

This update makes integration with crates.io/crates/openpgp-card- optional.

rsop-oct can now implicitly use persisted PINs via openpgp-card-state, or explicitly provided ones via the standard SOP CLI parameter '--with-key-password'.

For more on #SOP, see datatracker.ietf.org/doc/draft

crates.iocrates.io: Rust Package Registry

New release: #rPGP version 0.16.0 🧰🔐✨

github.com/rpgp/rpgp/releases/

#OpenPGP implemented in pure #Rust, permissively licensed

This release features streaming message support: Now rPGP can process arbitrarily large messages, with modest memory requirements.

It adds experimental support for the upcoming OpenPGP #PQC IETF standard datatracker.ietf.org/doc/html/

This release also brings various improvements for key generation, support for X448/Ed448, and many minor fixes.

⛰️  Features

Update to draft-ietf-openpgp-pqc-10 (#565) - (01a9643)

🚜 Refactor

Cleanup the interface of crypto::*::SecretKey - (45e1ea8)
GitHubRelease v0.16.0 - Stream the world & PQC · rpgp/rpgp⛰️ Features Update to draft-ietf-openpgp-pqc-10 (#565) - (01a9643) 🚜 Refactor Cleanup the interface of crypto::*::SecretKey - (45e1ea8)

our friends over at @rpgp just published a monster milestone, humbly tagged 0.16 😍 with

- streaming decryption and encryption

- post-quantum-cryptography

- API streamlining.

#rPGP is a full Rust implementation of #openpgp which counts among the fastest and most compliant implementations today, and includes security audits. Note: #deltachat uses a restricted subset of OpenPGP, and follows best practices (eg using the same ed25519 keys implementation as #signal) github.com/rpgp/rpgp/

OpenPGP implemented in pure Rust, permissively licensed - rpgp/rpgp
GitHubGitHub - rpgp/rpgp: OpenPGP implemented in pure Rust, permissively licensedOpenPGP implemented in pure Rust, permissively licensed - rpgp/rpgp

Don't use PGP with emails.

> Security researchers are sounding the alarm over a fresh flaw in the JavaScript implementation of OpenPGP (OpenPGP.js) that allows both signed and encrypted messages to be spoofed.

> Discovered by Codean Labs' Edoardo Geraci and Thomas Rinsma, the vulnerability essentially undermines the core purpose of using public key cryptography to secure communications.

**OpenPGP.js bug enables encrypted message spoofing**

theregister.com/2025/05/20/ope

The Register · Freshly discovered bug in OpenPGP.js undermines whole point of encrypted commsBy Connor Jones

»OpenPGP.js bug enables encrypted message spoofing:
Security researchers are sounding the alarm over a fresh flaw in the JavaScript implementation of OpenPGP (OpenPGP.js) that allows both signed and encrypted messages to be spoofed.«

I hope this will be resolved as soon as possible and the web email hosters will then also use the current version.

🔓 theregister.com/2025/05/20/ope

The Register · Freshly discovered bug in OpenPGP.js undermines whole point of encrypted commsBy Connor Jones

Somewhat concerning for anyone who uses Proton Mail: there is a flaw in the OpenPGP javascript library that they use (and are the maintainers for) which means that it's possible for spoofed authentication signatures to be created.

theregister.com/2025/05/20/ope

The Register · Freshly discovered bug in OpenPGP.js undermines whole point of encrypted commsBy Connor Jones

Wenn ihr neuen code schreiben würdet wo crypto signaturen und encryption von objekten/nachichten vorkommen soll, sowie authentication von hierarichischen Personen/Organisationen mit web of trust - also ugf. alles was openpgp auch machen will, euch aber #openpgp zu kompliziert ist ... was nimmt man da? s/mime + x509 oder gibts da schlankeres?

🎬 When Code Became a Weapon

It's easy to take strong encryption for granted, but that hasn't always been the case. This week we're diving into the "Crypto Wars," covering historical attempts by the US government to restrict strong encryption being exported internationally.

privacyguides.org/videos/2025/

Let us know what you think of this style of video! We're trying something different, and this is the first in a planned series lined up 😄

First steps towards more robust sync!

#Hockeypuck’s dataset normalisation rules (or “filters”) were updated between v2.1 and v2.2, meaning that #SKS recon did not work between #openpgp #keyservers running the older and newer versions. The keyservers could not all be updated simultaneously, and a few keyservers still run v2.1 today for compatibility reasons, so we had to find a way to prevent the network from split-braining.

The quick and dirty solution was a small script that runs on each side of the filter discontinuity, polls for local changes, and submits them to the other side over HKP (the protocol your #PGP client uses). But this is effectively the same idea as the old PKS sync model, just over HTTP(S) instead of email. And sks-keyserver used to support PKS-over-email, so shouldn’t hockeypuck be able to do PKS-over-HTTP natively?

The short answer is, it can! It was long intended for hockeypuck to support PKS email, but only a fraction of the necessary code was written, and there were no tests. Today, the pgpkeys test swarm has just performed its first sync using the completed PKS code, which supports *both* HTTP and email transport.

It’s not ready for production yet though. Further testing is required, and then the second part of the PKS code can be written: automatic failover from SKS to PKS when filter mismatch is detected (and just as importantly, automatic fail*back*).

This will mean that keyserver operators will be able in the future to upgrade across filter discontinuities without risking a split brain scenario. It should also mean that key updates submitted to the hockeypuck network could be automatically synced to @keys_openpgp_org … watch this space! 😎

(Hockeypuck v2.3 development is kindly supported by @NGIZero Core)