Hi all,
I'm hoping for a good turnout at this meeting as this is a fantastic opportunity to get PGP keys signed and exchanged with a very useful crowd of people. And by saying that, I mean I'm hopeful that some of the lurkers who are well connected can make it to the meeting (you! yes, you!).
This PGP keysigning party is very timely as Yahoo just announced PGP support:
http://arstechnica.com/security/2014/08/yahoo-to-begin-offering-pgp-encrypt…
...wait a minute, that's from 2014. Looks like I just got caught re-using an E-Mail from a couple of years ago. Oh well. :)
So, before the meeting, run gpg --gen-key and gpg --send-keys --keyserver keyserver.ubuntu.com <Key ID> as necessary then E-Mail the output of gpg --fingerprint <ID or eMail address> to frank(a)nblug.org to allow him to get a list ready (but if you don't get to this, come to the meeting anyway).
See you there!
A.C.
******
President, North Bay Linux Users' Group
On 02/12/2018 04:52 PM, E Frank Ball III wrote:
> This is tommorow night and I haven't gotten very many keys yet:
>
> Topic: GPG Key Signing Party
> When: Tues February 13th, 7:30 PM to 9:00 PM
> Coordinator: Frank Ball
> Location: O'Reilly Media, Sebastopol CA, in the Tarsier conference room past the metal statue and to the right - http://nblug.org/locations
>
> GPG Key Signing Party:
>
> It's time for another GPG key signing. We had one in May 2003 & August 2014.
>
> The point of this is to create a web of trust. By signing someone's
> public key, you state that you have checked that the person that uses a
> certain keypair, is who he says he is and really is in control of the
> private key. This way a complete network of people who trust each other
> can be created. This network is called the Strongly connected set.
> Information about it can be found at http://pgp.cs.uu.nl/
>
> Before the meeting:
>
> 1) Generate a public/private keypair with the "gpg --gen-key"
> command (accept the defaults), see man gpg for more info.
>
> 2) Upload your key to a keyserver:
> gpg --send-keys --keyserver keyserver.ubuntu.com
>
> 3) Print out the key fingerprint with gpg --fingerprint
> Also include your full name, email address, and Key ID#.
> Bring this to the meeting,
> and optionally make extra copies to hand out.
>
> 4) Email me at frank(a)nblug.org with the fingerprint, email address, full
> name, and Key ID. I'll have a list of everyone's info to hand out.
>
> During the meeting:
>
> Verify your GPG key fingerprint on the list I hand out and
> verify your identity (with photo ID).
>
> After the meeting:
>
> 1) Download the all of the keys for the fingerprints verified at the meeting
>
> 2) add them to your keyring
>
> 3) sign them
>
> 4) upload your key again.
>
> More info:
>
> https://help.ubuntu.com/community/GnuPrivacyGuardHowto
>
> http://cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
>
> _______________________________________________
> talk mailing list
> talk(a)nblug.org
> http://nblug.org/cgi-bin/mailman/listinfo/talk
>
Topic: GPG Key Signing Party
When: Tues February 13th, 7:30 PM to 9:00 PM
Coordinator: Frank Ball
Location: O'Reilly Media, Sebastopol CA, in the Tarsier conference room
past the metal statue and to the right - http://nblug.org/locations
GPG Key Signing Party:
It's time for another GPG key signing. We had one in May 2003 & August 2014.
The point of this is to create a web of trust. By signing someones
public key, you state that you have checked that the person that uses a
certain keypair, is who he says he is and really is in control of the
private key. This way a complete network of people who trust each other
can be created. This network is called the Strongly connected set.
Information about it can be found at http://pgp.cs.uu.nl/
Before the meeting:
1) Generate a public/private keypair with the "gpg --gen-key"
command (accept the defaults), see man gpg for more info.
2) Upload your key to a keyserver:
gpg --send-keys --keyserver keyserver.ubuntu.com
3) Print out the key fingerprint with gpg --fingerprint
Also include your full name, email address, and Key ID#.
Bring this to the meeting,
and optionally make extra copies to hand out.
4) Email me at frank(a)nblug.org with the fingerprint, email address, full
name, and Key ID. I'll have a list of everyone's info to hand out.
During the meeting:
Verify your GPG key fingerprint on the list I hand out and
verify your identity (with photo ID).
After the meeting:
1) Download the all of the keys for the fingerprints verified at the meeting
2) add them to your keyring
3) sign them
4) upload your key again.
More info:
https://help.ubuntu.com/community/GnuPrivacyGuardHowtohttp://cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html