logo

blog

My little blog can’t be this cute!
commit: 7b796e32557e86cb6dd463ac221d54463bd03020
parent: 4f0a5fd78b3ddb726ee0d1c7341eb991ab91a111
Author: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
Date:   Sun,  4 Feb 2018 22:30:40 +0100

canary.asc: Update

I know I’m late again… but hey, nobody pinged me on that anyway so I took my time

Diffstat:

Mcanary.asc35+++++++++++++++++------------------
1 file changed, 17 insertions(+), 18 deletions(-)

diff --git a/canary.asc b/canary.asc @@ -1,7 +1,7 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -This is an OpenPGP[why?] signed canary. The first attempt to do one failed… (I’m bad at having habits) +This is an OpenPGP signed canary. The first attempt to do one failed… (I’m bad at having habits) I choosed OpenPGP because it allows to: • verify my identity (web of trust, meeting me, …) • have a crypto-signed: text, date, expiration date @@ -9,7 +9,7 @@ I choosed OpenPGP because it allows to: This canary will be updated as often as possible and cryptographicaly expires after 6 months. -== Statements == +## Statements • anything that can harm and/or have harmed data, received or send to me and or my machines: • SSID=orange, modifies few paquets, got fixed few hours later, no harmful data sent. • DNS gave a weird answer, fixed directly.[1] @@ -21,12 +21,20 @@ This canary will be updated as often as possible and cryptographicaly expires af • my keys are all safe and protected and old ones are revoked and few old ones unuseable(shred) • On 2016-12-17 I made myself a new keyring, the old one was a huge mess… sorry for the mess of revoked keys • On 2017-05-03 04:19:00 I made new (ECC) keys, after hardware failure and no backups or old keys, and so broke HPKP + • On 2018-01-11 I changed my default GPG key set to DDC9237C14CF6F4DD847F6B390D93ACCFEFF61AE and it’s now store only on a Nitrokey Start and a paperkey backup -== TL;DR == +### Certificates Log (for hacktivis.me) +Begin on/Not Before; Expire on/Not After; Organisation; Serial +2018-01-22T00:24:54; 2018-04-22T00:24:54; Let's Encrypt; 03:56:2e:f8:c5:5f:24:08:4b:52:15:71:03:cf:7d:64:4b:23 +2017-10-23T23:02:20; 2018-01-21T23:02:20; Let's Encrypt; 03:2E:23:BF:A9:31:5C:25:5F:12:00:70:44:12:3E:DB:77:BD +2017-07-25T23:56:00; 2017-10-23T23:56:00; Let's Encrypt; 03:BC:D9:81:CF:CA:53:90:2E:90:B4:D0:81:26:6A:4B:C6:34 + +### TL;DR • I’m safe but you should not have a blind trust on me. -== Commands used == -• vim canary +## Commands used +• cp canary.asc canary +• vis canary • gpg --default-sig-expire 6m --clearsign canary • shred -u canary @@ -35,17 +43,8 @@ Inspired by: https://fyb.patternsinthevoid.net/canary.asc and https://github.com 1: https://hacktivis.me/articles/La%20neutralit%C3%A9e%20du%20Net%20sur%20un%20wifi%20Orange%E2%84%A2,%20deuxi%C3%A8me%20mensonge -----BEGIN PGP SIGNATURE----- -iQI5BAEBCgAjFiEEnKAFlDsjdFOiSBlNAZaWk6MMhzIFAlkMzd0FgwDtTgAACgkQ -AZaWk6MMhzIOrg/+LwFW3Kap7cPTIwcILDBc4Qywax5oTZPcviTMt2JDB7B7ep6z -5zq/HIncRod6yPkrZUThRZUaPkspBJvy/MqMnulQBcU9CIAmxqExfL6PaIR6srqq -Pd21+Icr2iXpMAZK/o0EGBHXTjx1iI9P50HMpcWH/op4C189+Zg4Yh72muyU5lEo -CsxHIeg7JeSPpHTtBMc0TX/smYosw4SWuHqJpjlvlk/JmsAopCdWnJsOq3LTqUEd -Q0wjPwCAW+zG4ZAddLMKt5bl34t/EydHkwufy/Wv8vJDRPkweUt7T8cEIhLC0VAE -xhOgU7dprjWsshQ5DmyPMIShHMzdB/ObAMf71nbAA8OPCF5d29GzVBBKjnKSi5U4 -PUuQ85fdfuZu7yC9ZlNJLvx8tcJ23cT9GQclbix6XzX4ZrITuQ7YKq6kv3IOq/DZ -OTasNZLq0UALkZrS6GVvlpohPHnK4FSInQBJBJvWAz82dmSACG46eBO3Zw3p7f4D -gBuA+jgghvVHR4Hk54R0lwZy6ms+NsfpWadYOrJQuNDrcxdvcz9S0ZPBinolZga3 -dzdmbqvLj2UIiNW4aODJAb6vPdQgY37c7YyRu+JHwmwLAAgowFnsJHfi3Nq+dnfk -xFJxScSUjuX80T+RHbL1jrWhZAxewLHuertHyFosHIsNqYHX7tzcNVseVjY= -=dQGy +iHsEARYKACMWIQT4W9xj/ZtK9Ev2uBLVt6jkPJl97gUCWnd7RgWDAO1OAAAKCRDV +t6jkPJl97nh6AQC8y8FTbNJU0Y8OF98n9gMHU1iPvZdbCRUkyCqPYclcwwEAqpno +MUDnteh0Yfjfw3ZVOdPRgLrKAz6tgj5EO5AfZw0= +=8nx9 -----END PGP SIGNATURE-----