1. The purpose of this echo is to provide a place to discuss
public-keys for data privacy within FidoNet and elsewhere. We also
consider electronic signature possibilities using public-keys and
discuss data and software encryption and the various schemes and
programs that produce them.
5. No Private flagged messages in Echomail! Encrypted traffic using
public-keys is permitted for the exercise so long as it is
on-topic. Don't send person-specific encrypted traffic. Such
specific traffic belongs in direct Netmail. Encrypted traffic
should be in the form of ASCII-armored or personal key encrypted
messages that can be read by anyone with PGP 2.6+ and your
public-key. Include your public-key in a separate message before
sending such test messages in case the other end doesn't have it
or make them aware of how to get it from your system. If you just
want to post your public-key, use PKEY_DROP Echo.
have at it :)
So I have installed a gpg4win bundle on my pc and have created a public key which I can post here and you (or others) can then use to encrypt a message to send to me - right?
yes... your signature should also end up on one of the public keyring servers so that anyone can retrieve it... the trick is interfacing with FTN software if you want to use it in this environment... the body of
the message, without control lines, has to be saved to a temp file, pgp
or gpg run on it to wrap and sign it and then the temp file gets
imported to replace the original... on my TimED/2 system, i have the following options and commands...
But if I were to post and encrypted message here it would be of no us to anyone unless I had encrypted it using someone elses public key (s they could unlock it) - right?
it works two ways...
1. if you post a message encrypted with your PRIVATE key, anyone with
your PUBLIC key can decrypt it... that proves it was you that encrypted it... 2. if you post a message encrypted with my PUBLIC key, only i will be able to decrypt it...
then there's signing a message instead of encrypting it... signing wraps the message and places a digital signature at the bottom... others use your public key to verify that you really did sign the message *and*
that it hasn't been altered in transit... signing is very common and generally seen in message posting areas... encrypted stuff may be used more in private transactions, though... i'm not sure there is a metric
for counting those...
we have to make sure that in FTNs, and other places like news groups and mailing lists, that we are having the tool to emit ascii and not
binary... it is possible to encrypt a message and the result is binary which is sent but trying to get binary into a message and get it back
out without altering it is tricky at best... much easier to use ascii which is already formatted and wrapped to 70 characters and ready to
post anywhere...
PGP Fingerprint 0xB60C20C5
Sysop: | altere |
---|---|
Location: | Houston, TX |
Users: | 69 |
Nodes: | 4 (0 / 4) |
Uptime: | 08:20:47 |
Calls: | 1,161 |
Calls today: | 1 |
Files: | 8,179 |
Messages: | 300,897 |