logo

blog

My little blog can’t be this cute!
commit: d654fa3729cfdcdb4d11964307b1842fbba33362
parent: c79c98f18cde4143f780717397c5bbab7dbbe877
Author: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
Date:   Wed,  9 Jan 2019 04:27:30 +0100

articles/I’m removing defaults to eternal cryptographic signatures.xhtml: Fediverse-link

Diffstat:

Marticles/I’m removing defaults to eternal cryptographic signatures.xhtml1+
1 file changed, 1 insertion(+), 0 deletions(-)

diff --git a/articles/I’m removing defaults to eternal cryptographic signatures.xhtml b/articles/I’m removing defaults to eternal cryptographic signatures.xhtml @@ -11,4 +11,5 @@ <p>It’s something that weirdly doesn’t seems very popular in cryptonerds circles. Long-term signatures in a computer world basically is that everything that you send can and will be used against you and people you interacted with or wrote about and there is absolutely no deniability about it.</p> <p>For example with DKIM: The content of the message is known to not be modified and to have been send by the right provider. What is required? The email and a DNS record (which is usually not changed). No interception whatsover is required. Also this standard absolutely doesn’t help against receiving unwanted messages (aka SPAM), so in my opinion it’s a waste of human time(configuration) and computing power.</p> <p>Did you ever send a message that can be used against you or someone else? Probably (I surely did, please do not continue on this). Also if it can’t be used against you right now, it might be later.</p> +<p><a href="https://queer.hacktivis.me/objects/1aa27f43-3e99-4a19-89a0-cec3c4d98200">Post for comments and sharing on the fediverse.</a></p> </article>