SKS PGP Keyservers Nodecount Dropping
https://sks-keyservers.net/status/ https://web.archive.org/web/*/https://sks-keyservers.net/status/ Number of servers in pool slowly dropping, might need volunteers at some point, including more nodes on Tor, I2P, CJDNS...
grarpamp wrote:
https://sks-keyservers.net/status/ https://web.archive.org/web/*/https://sks-keyservers.net/status/
Number of servers in pool slowly dropping, might need volunteers at some point, including more nodes on Tor, I2P, CJDNS...
The majority of GnuPG users no longer use SKS key servers, due to the fact of possible attacks on their pub keys. It seems SKS key servers are nowadays only used for censorship resistant communications. Todays popular key servers are: keys.openpgp.org or keys.mailvelope.com, besides Werner Koch's WKD. Regards Stefan
Has it not been established that all key servers are compromised, that's _all_ not just some accused to divert attention from all. The compromise is not new just not well understood due to avid promotion of crypto as necessary for public and commercial privacy, infosec, comsec. CryptoAG is a noteworthy example of the deception but its confirmation too is a diversion from more deeply hidden subterfuges. Then Tor, I2P, CJDNS, Secure Drop, Signal, et al, each eagerly boosted than gradually falling in credibility and trustworthiness to be succeeded by new borns. It might be worth pondering Snowden's quite limited "gift to the public" as another active measure to bamboozle in the WikiLeaks manner, indeed media-born leaks as a principal tool to meddle with information and data, not that any digital method can compete with the internet itself for that role. The recent post about crypto's failure to serve the underprivileged, citing cypherpunks as an example, is indicative of where a next step for injecting compromised sec tools is headed, following bitcoin's amazing rise as top tracker of finance under pretense of untraceability. "Cybersecurity" is booming as education, as jobs, as investments, as must have protection and aggression initiatives. Apt that Covid shot that CyberPonzi delirium with a sneak attack on the backdoor implanters. At 07:27 AM 9/2/2020, you wrote:
grarpamp wrote:
https://sks-keyservers.net/status/ https://web.archive.org/web/*/https://sks-keyservers.net/status/
Number of servers in pool slowly dropping, might need volunteers at some point, including more nodes on Tor, I2P, CJDNS...
The majority of GnuPG users no longer use SKS key servers, due to the fact of possible attacks on their pub keys. It seems SKS key servers are nowadays only used for censorship resistant communications.
Todays popular key servers are:
keys.openpgp.org or keys.mailvelope.com, besides Werner Koch's WKD.
Regards Stefan
I would like to add the following. People who are involved in secure communication on the Internet today and who are new to this topic, do not learn that security, such as privacy or anonymity etc. a) costs money and b) should be used in conjunction with offline devices. Surely licensees of tools like FinFisher or Pegasus could confirm that cryptography on online devices like smart phones or computers might be quite useless. John Young wrote:
Has it not been established that all key servers are compromised, that's _all_ not just some accused to divert attention from all. The compromise is not new just not well understood due to avid promotion of crypto as necessary for public and commercial privacy, infosec, comsec. CryptoAG is a noteworthy example of the deception but its confirmation too is a diversion from more deeply hidden subterfuges.
Then Tor, I2P, CJDNS, Secure Drop, Signal, et al, each eagerly boosted than gradually falling in credibility and trustworthiness to be succeeded by new borns.
It might be worth pondering Snowden's quite limited "gift to the public" as another active measure to bamboozle in the WikiLeaks manner, indeed media-born leaks as a principal tool to meddle with information and data, not that any digital method can compete with the internet itself for that role.
The recent post about crypto's failure to serve the underprivileged, citing cypherpunks as an example, is indicative of where a next step for injecting compromised sec tools is headed, following bitcoin's amazing rise as top tracker of finance under pretense of untraceability.
"Cybersecurity" is booming as education, as jobs, as investments, as must have protection and aggression initiatives. Apt that Covid shot that CyberPonzi delirium with a sneak attack on the backdoor implanters.
At 07:27 AM 9/2/2020, you wrote:
grarpamp wrote:
https://sks-keyservers.net/status/ https://web.archive.org/web/*/https://sks-keyservers.net/status/
Number of servers in pool slowly dropping, might need volunteers at some point, including more nodes on Tor, I2P, CJDNS...
The majority of GnuPG users no longer use SKS key servers, due to the fact of possible attacks on their pub keys. It seems SKS key servers are nowadays only used for censorship resistant communications.
Todays popular key servers are:
keys.openpgp.org or keys.mailvelope.com, besides Werner Koch's WKD.
Regards Stefan
It might be worth pondering Snowden's quite limited "gift to the
On Wednesday, September 2, 2020, 06:08:19 AM PDT, John Young <jya@pipeline.com> wrote: [snip] public" as another active measure to bamboozle in the WikiLeaks manner, indeed media-born leaks as a principal tool to meddle with information and data, not that any digital method can compete with the internet itself for that role. Yes. I realize that there are doubts about what Snowden did, and how and why he did it. But, the public won't generally see this obscure dispute. Perhaps (for "public relations" purposes) we ("Cypherpunks", and people who are sympathetic to our goals) would be better off if that public viewed the exposure of NSA's Internet and phone-call recording system as being a "good thing". As if it were a 'loss' for the US Federal government, for purposes of maintaining morale 'on our side'. I think we'd rather have THAT, than have Snowden (and/or Assange) brought back in chains, which would be a rather massive deterrent to future leakers. And yes, there will be future leakers! To steal from a old song, "If you can't be with the leaker you love, love the leaker you're with". (at least, publicly). https://www.youtube.com/watch?v=SY4HI_vqf0c Crosby, Stills, and Nash. "Love the one you're with". Jim Bell
On 9/2/20, John Young <jya@pipeline.com> wrote:
Has it not been established that all key servers are compromised,
The majority of GnuPG users no longer use SKS key servers, due to the fact of possible attacks on their pub keys.
It's not that the nym <--> privkey mapping of any given key has been internally compromised, that is signed. But that key servers and their keys were discovered by the public to be handy datastores open to arbitrary data insertion, including of duplicate nyms, public sigs, etc. Plausible keys can still be found. For which old wisdom of verifying the WoT still applies. Unfortunately the WoT has not yet developed enough degrees around the world, such that many paths between say your key and any other are still woefully broken. Thus requiring much offline and direct verification with the intended party. Two ways to help fix that is to hold *many* more keysigning parties, and to publish and self assert over the fingerprints in many more online social and business places.
Then Tor, I2P, CJDNS, Secure Drop, Signal, et al, each eagerly boosted than gradually falling in credibility and trustworthiness to be succeeded by new borns.
Cybersec apps and staff always seem to hide their easily notable design caveats, such caveats being addressed by the nextgen, which dutifully hides its own caveats in turn. We will see which new apps will take the initiative to address the current overlay network attack vectors of network traffic analysis and sybil attacks. And what holes they in turn skirt around and censor-ban-cancel you for talking about.
The recent post about crypto's failure to serve the underprivileged, citing cypherpunks as an example, is indicative of where a next step for injecting compromised sec tools is headed, following bitcoin's amazing rise as top tracker of finance under pretense of untraceability.
Indeed.
Apt that Covid shot that CyberPonzi delirium
Not shot just that, but a breadth and depth of human areas, the changes and impacts (mostly not so good as usual) due to oppurtunistics will hardly begin apparent to clairvoyants even five years hence.
keys.openpgp.org or keys.mailvelope.com, besides Werner Koch's WKD.
"More nodes on overlay networks" is a notion generally applicable to any set of cypherpunk services, information bases, infrastructure, etc, not just these. Or you could take Juan's approach and smash it all. However most are not ready to adopt the resulting lifestyle yet. Neither has Juan, nor anyone else still tapping on their keyboard.
Yes, but are the Keyservers droppin' like it's hot? drop 'em like they're hot? Got the rollies on my arms and I'm pourin' Shawn Dawn and I roll the best weed cuz I got it goin' on. Bow da wow wow... shitz in the sepsis, ma bell, drop it like it's hawt, drop it like it's hawt, Sn00py hit the l0tto, Lupe hit the l0tt0
participants (5)
-
Douglas Lucas
-
grarpamp
-
jim bell
-
John Young
-
Stefan Claas