Good thread. Offering merits is more likely to succeed than offering
2256% airdrop bounties.
A private message for OgNasty—others MUST NOT read:-----BEGIN PGP MESSAGE-----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=BRkx
-----END PGP MESSAGE-----
My public key is available from
Nullian Verification. Its fingerprint has been in my signature ever since I was at Newbie rank, as may be viewed in any archives of my posts.
PSA:
Always make sure that you have the right key!
You can also use
gpg -v -v, with shell redirects of stderr to a pager.
E.g.:gpg -v -v < message.asc 2>&1 | less
I also recommend using shell redirects to encrypt messages for forum PMs. This will avoid leaking the filename into the PGP metadata, as would occur if you provide
gpg with the filename as an argument.
The exact command that I used to encrypt the above message to OgNasty:gpg -a -s -e -r 0xA338C617DE66E656 -r 0x5A00591B2F307E0C < 2020-11-26.ognasty.txt > 2020-11-26.ognasty.asc
-snip- It's pretty easy to import the public key but I doubt there is something wrong since the public key you've given is different which is ECC (Elliptic Curve Cryptography). -snip-
I am trying to show the Public key with an algorithm other than RSA.
I myself recommend and use ECC, specifically ed25519 (signing/certification) and cv25519 (encryption (ECDH)) keys. GnuPG-compatible OpenPGP ECC implementations now
include Protonmail;
I recommend that Protonmail users should switch to “X25519” keys for an optimal combination of security and performance. The substance of
Werner Koch’s specification for this is being
rolled into the OpenPGP standard under
RFC 4880bis.
This is a newbie thread, so here is one of my Newbie posts about ECC in PGP:
ps-> nullius how did you get a PGP Ed25519: 0xC .... ?
GnuPG supports
ECC since version 2.1. Requires options `--full-gen-key --expert` (or noninteractive key generation as I used). NIST and Brainpool curves are supported; but also: “For many people the NIST and also the Brainpool curves have an doubtful origin and thus the plan for GnuPG is to use Bernstein’s Curve 25519 as default. GnuPG 2.1.0 already comes with support for signing keys using the Ed25519 variant of this curve. This has not yet been standardized by the IETF (i.e. there is no RFC) but we won’t wait any longer....”
Much PGP software does not yet support my Curve25519 keys. My .sig reminds me of the 90s, when people had both PGP2/PGP5 keys. In the mass market, interestingly, Keybase can use my ECC keys just fine. I’m not sure if that’s a good thing.
try changing the default key server in Kleopatra which is the "hkps: //hkps.pool.sks-keyservers.net" to the remaining publicly available key servers.
(And some other posts on this thread.)The old keyserver network is deprecated. I recommend avoiding it, including both SKS and the MIT PGP server.
The problem is systemic, due to design-level vulnerabilities. Thus, there are currently efforts to make new standards for “abuse-resistant” keyservers, and alternative means of distributing keys.
fine. keep your secrets
In Bitcoinland, it is unsurprising that some should be
cryptic.
-----BEGIN PGP MESSAGE-----
hF4DAAAAAAAAAAASAQdAUuGyU/Z/XkJcdu6zuPV2cYeEUcW/Cot3BwN1+fbwJyow
kIIWNt8NvYgaczHtjp3t61wW/+Ge+kP4ozXyLr72cI1MpTUJKBTa2LFLbQvLpajf
0sAGAadfjt+a4MQE7D2+SO7yWdYZABZqGbrCRSAVZ/4QhGHddm1gM8ODi06YhMBy
yeABzJxbYpdhqJ71XuSgoMmnO/Jsz8X4vn7mrWLGl1kJGob9m772P+mYfulfL/Gx
5c9DMteREa8ClHIY/AQ+GvnaMeUeOaPwAO89ELP9ussl55S4s6zRMuvTYZXptrRg
iBM63qpcCzH4BtuDH8qaoCT+ZJ1Q5y5ponQX1C6StcXunWTtR+ZvkXRm2JFGy8OA
Web3GJdc9rNH
=EymV
-----END PGP MESSAGE-----
Just as the best of thought was once upon a time writ in classical Latin, or even reserved in Greek, or...
* nullius is currently seeking Sanskrit translators for his most precious thoughts.
...kept private.
-----BEGIN PGP MESSAGE-----
hF4DdPInIjWYj0gSAQdAchXa720iVwmWLQN1cICKevEJxryBiWJ6bLvx+tM8gEIw
KgefJCjU97LFDh9hDiDsKs2fr18ySI3pxTvRxbOVHnD5ImeXl2T1nNUf5Jx1aK2M
0sADAdIk8BIye3dWxhFX+fqC3KJhv2X5SDkv17BPL6AmS+UdRI9BXl9Ru3Ksiju9
Z+Jat7bawWjXjVeTAJcFIXtFCxZfDIhb4BDgwM94EAqWugaSdh5aXEKbS/cSelJY
kMcPd/hgCNctdxBPg/oO7rBIKcJ8NC5Uqv/2MKi9hdGzZsgh6HpovqzOltSF/B0d
9XwnF03Ptst3nt8Ob+6aI/D73l/dpKbaAGzYdAUTY2notugFKNFObLQXHGvprYh9
nYHSjkhE
=SMbz
-----END PGP MESSAGE-----
Information wants to be valued—and I do
not mean that in the monetary sense.
Intelligence is priceless.Nullius is certainly a member of Cicada 3301 group. Just search about it on internet, and you will find way too many similarities! 😄
-----BEGIN PGP MESSAGE-----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=kA2C
-----END PGP MESSAGE-----
e95fb2193dd348de266b7cc350b8c643c472af82e06987d4a34916e5c5b68970
d26ce23462834637dc23c09e64b60cf9d207db8779c4110b8125a0b30a6b02ab
This is a horribly stupid idea. DO NOT USE!Generate your private and public PGP keys online. This PGP key generator is does not require you to install any software and your PGP keys remain confidential. iGolder does not log any activity done on this page. We created this tool for you to benefit PGP encryption for contacting us, contacting any iGolder member having a public PGP key, or contacting your friends.
iGolder respects your privacy and does not log nor monitors any activity (key creation) done on this web page.
= “Trust us!”
I did not waste the time to figure out what if any Javascript affects this, but it does look like all key generation and encryption is done
on the server:This is not like Protonmail, or Keybase’s web app (already questionable trust issues, IMO). On iGolder’s site,
all secret key material and message plaintext are sent to the server!
If you use this for “contacting your friends” as they suggest, then you are screwing your friends over—and you are untrustworthy to them. DO NOT USE!