On Mon, 6 Jan 2025 10:53:43 +0100, Vincent Breitmoser
wrote:
...do you think PQC-sized public keys might become a challenge?
I attached to my prior list message the same PQC key that was rejected
by keys.openpgp.org when I tried to upload it. It’s 3106 bytes,
ASCII-armored.
PQ keys with
A question of netiquette: Is it acceptable to do this on a first post
to a public list?
IIRC, Autocrypt specifies a way for public keys to be transferred in an
email header that's parsed by Autocrypt-aware clients and not rendered
or acted upon by non-aware clients. Seems like the best thing
On Mon, 06 Jan 2025 09:09:28 +0100, Werner Koch wrote
(quotes rearranged):
For initail key discovering (lookup) there are better methods:
Thanks for the tips.
- Send the key with your initial may and start to build up trust.
(after all there must be some reason that you trust a mail addre
[i removed h...@anonymous.sex; never did such..]
Michael Richardson wrote in
<20925.1736187...@obiwan.sandelman.ca>:
|Werner Koch via Gnupg-users wrote:
|> There is one remaining reason for having a network of synced
|> keyservers: To distribute revocations.
|
|> Lookup of keys by anything
Werner Koch via Gnupg-users wrote:
> There is one remaining reason for having a network of synced
> keyservers: To distribute revocations.
> Lookup of keys by anything other than a fingerprint has no more
> justification. And for that feature a simple distibuted storage for
Hey there,
fair points here, for users who don't see value in certificate discovery
via verifying keyservers. I would argue it's not universally agreed
upon: We did see 60k newly verified email addresses on keys.openpgp.org
in the last year though, adding to a total of half a million or so.
Hi!
On Fri, 3 Jan 2025 18:29, have--- said:
> I won’t ambush a volunteer answering support@ for a free keyserver,
> but I will publicly quote my own reply below. There has been no
The concept of public keyservers is dead. It worked well in a past
Internet with mostly friendly inhabitants. Bu