[NBLUG/talk] GENERAL MEETING Lightning Talks / Hackfest / GPG Key Signing

Allan Cecil ac at sonic.net
Fri Aug 8 17:42:05 PDT 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

I'm hoping for a good turnout at this meeting as this is a fantastic opportunity to get PGP keys signed and exchanged with a very useful crowd of people.  And by saying that, I mean I'm hopeful that some of the lurkers who are well connected can make it to the meeting (you! yes, you!).

This PGP keysigning party is very timely as Yahoo just announced PGP support:

http://arstechnica.com/security/2014/08/yahoo-to-begin-offering-pgp-encryption-support-in-yahoo-mail-service/

So, before the meeting, run gpg --gen-key and gpg --send-keys --keyserver keyserver.ubuntu.com <Key ID> as neccessary then E-Mail the output of gpg --fingerprint <ID or eMail address> to frank at nblug.org to allow him to get a list ready (but if you don't get to this, come to the meeting anyway).

See you there!

A.C.
******


On 08/01/2014 12:17 PM, E Frank Ball III wrote:
> 
> 
> GENERAL MEETING
> 
> Lightning Talks / Hackfest / GPG Key Signing
> 
> When: Tue Aug 12, 2014 07:30 PM to 09:00 PM
> Coordinator: Frank Ball
> Location: O'Reilly Media, Sebastopol CA
> 
> Lightning Talks:  Have something you would like to present, but don't
> have enough material for a full talk?  Here's your chance.  Talk about
> anything Linux related.
> 
> Hackfest:  Bring your hardware to get help with it or just to show it off.
> 
> 
> GPG Key Signing Party:
> 
> The point of this is to create a web of trust.  By signing someone's
> public key, you state that you have checked that the person that uses a
> certain keypair, is who he says he is and really is in control of the
> private key.  This way a complete network of people who trust each other
> can be created.  This network is called the Strongly connected set.
> Information about it can be found at http://pgp.cs.uu.nl/
> 
> Before the meeting:
> 
> Create a GPG keypair, upload your public key to a keyserver, print out
> the fingerprint, mail it to me (frank at nblug.org) and bring copies to
> the meeting.
> 
> Details:
> 
> 1) Generate a public/private keypair with the "gpg --gen-key" command (no
> arguments required), see "man ssh-keygen" for more info.
> 
> 2)Upload your key to a keyserver:
> "gpg --send-keys --keyserver keyserver.ubuntu.com <Key ID>"
> 
> 3) Print out the key "fingerprint" with
> "gpg --fingerprint <ID or eMail address>".
> Also include your full name, email address, and Key ID#.
> Bring this to the meeting, and optionally make extra copies to hand out.
> 
> 4) email me at frank at nblug.org with the fingerprint, email, full name,
> and Key ID.  I'll have a list of everyone's info to hand out.
> 
> 
> During the meeting:  Verify your GPG key fingerprint on the list I hand
> out and verify your identity (with photo ID).
> 
> After the meeting:  Download the keys for the fingerprints verified at the
> meeting, add them to your keyring, sign them, and upload your key again.
> 
> More info:
> 
> https://help.ubuntu.com/community/GnuPrivacyGuardHowto
> http://cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
> 
> 
> _______________________________________________
> announce mailing list
> announce at nblug.org
> http://nblug.org/cgi-bin/mailman/listinfo/announce
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJT5W5dAAoJEChZJ+MVrwo8VYwH/1GoVRnZnbdyTuNqiT5/sSJ2
ocYV0cotllp9ED8o688dZMajl/1BmAFeiw4SVhyc1tq6vkjWDx8oMCzkCg1vkbjx
HsGzpRowwpASSo+rSBrGhdiqhoA8CORSRUJ2luSfiWy93mZ+7fzJMxJL7VvWZoS+
CJRU5Slk5qYpLAR8uAmamcX6p4+ZZw94ItPbCaQ9ce63UD6iTty9EBxkJxdJhWHy
tbjCamlVz4lIZfkIRwMMkqyYyzLtMQPAAcjkd6a+6swOSGJ9KbozphaN3BO3iWMS
YCkVG6aJF4CVO9tv4n7MuV9ys9QpnMKyLi9ZFVkcjz29HgtS1LH0rCI6m+4VYhg=
=c1F5
-----END PGP SIGNATURE-----


More information about the talk mailing list