I’m removing defaults to eternal cryptographic signatures
Quick Notes on how to
- git: Make sure
commit.gpgSignisn’t set. (system-wide:
git config --system --get commit.gpgSign, user-wide:
git config --global --get commit.gpgSign, repo-wide:
git config --local --get commit.gpgSign). To strip existing commits run
git filter-branchon the repositories.
- Email: Disable OpenPGP Signatures in your client if you did (also avoid Protonmail), make sure DKIM is non-existent, you may have to self-host your email
- Fediverse: For Mastodon starting with 2.7.0 (released 2019-01-20 12:40) you should use non-public statuses by default (See Pull Request #9659). Otherwise you can use Pleroma which doesn’t have JSON-LD Signatures.
- XMPP: Do not use OpenPGP or OX, OMEMO seems to have good deniability. I’m not very sure about OTRv3 as Simplifying OTR Deniability (referenced on OMEMO’s page) doesn’t mention the version.
It’s something that weirdly doesn’t seems very popular in cryptonerds circles. Long-term signatures in a computer world basically is that everything that you send can and will be used against you and people you interacted with or wrote about and there is absolutely no deniability about it.
For example with DKIM: The content of the message is known to not be modified and to have been send by the right provider. What is required? The email and a DNS record (which is usually not changed). No interception whatsover is required. Also this standard absolutely doesn’t help against receiving unwanted messages (aka SPAM), so in my opinion it’s a waste of human time(configuration) and computing power.
Did you ever send a message that can be used against you or someone else? Probably (I surely did, please do not continue on this). Also if it can’t be used against you right now, it might be later.
Post for comments and sharing on the fediverse.