PGP keys signed by me so I don't have to validate the same keys again-and-again and can just trust my own paper verified fingerprint in the subsequent validations.
Nelze vybrat více než 25 témat Téma musí začínat písmenem nebo číslem, může obsahovat pomlčky („-“) a může být dlouhé až 35 znaků.
Mikaela Suomalainen 4cddca7da3
software: update network-obs-suse.asc
před 2 dny
crypto-exchange add crypto-exchange/kraken-{ads,support}.asc před 1 měsícem
effi effi: add README.md to avoid ambiguosity před 2 měsíci
email-cloaking add email-cloaking/anonaddy.asc před 4 týdny
feneas feneas: add hq-feneas-org.asc před 1 týdnem
friends add friends/leonardo.asc & update me.asc před 1 měsícem
me update me.asc před 1 týdnem
ncsc-fi ncsc-fi: add advisory, news and signing keys před 1 měsícem
privacytools privacytools: update jonah.asc před 1 měsícem
software software: update network-obs-suse.asc před 2 dny
vpn vpn: add mullvad-code.asc & mullvad-support.asc před 1 měsícem
README.md update README & me/ & add my Unicus key před 2 týdny
me.asc update README & me/ & add my Unicus key před 2 týdny

README.md

pgp-alt-wot

PGP keys signed by me so I don't have to validate the same keys again-and-again and can just trust my own paper verified fingerprint in the subsequent validations.

WoT? Web Of Trust

Why?

For example, I use Tor Browser everywhere and download it directly from their website. They have signed it using GPG (a OpenPGP implementation) and to ensure it hasn't been tampered with, I have to check that signature and I have two options:

This second method is also encouraged by Tails.

What if I am wrong and trust the wrong key? I think I am less likely to trust a wrong key by verifying it carefully and signing it once than verifying it separately every time. However if I do sign a wrong key, I can always revoke my signature and then publish the key with my revocation signature on public keyservers (which I don't usually do, while I cannot control what people do with the signatures from this repository).

Inclusion policy

  • I am reasonably certain that the key belongs to whom it claims to belong to or I trust the key to belong to whomever it belongs to.
  • I have some need of the key or have attended keysigning party with the key owner.
  • me/me.asc is just my key and place where I try to keep all signatures it has received. Symlinks are legacy reasons and other me's are also me.

See also