#2176 "How Hacking Works"
If only somebody had warned them that the world would roll them like this.
The OpenPGP keyserver network is at risk of collapse. https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
I've been using OpenPGP for a long time now; at $lastjob I signed 99% of all my outgoing email, for example. I do not now, and never have, used the "web of trust". I directly manually verify every key I have in my keystore. If someone else signs my key for me, I thank them and keep the email, but don't publish the results. (With one exception for a period where it was looking like I'd have to become a Debian contributor).
I've phone up organisations and asked for their key fingerprints (yes, including CERTs). I've printed my fingerprints on business cards. I've used keys from the keyservers, to communicate with people that I know but don't happen to have the current key for.
I have never trusted someone elses' signature on a key, because I don't know if they have the same standards as I do.
Please update your pixelfed instance ASAP.
We have fixed a bug introduced earlier today that could have locked a single user out of their account.
Notopygos is a randomly choosen word from some wikipedia page, I like the idea of using pseudonym on the Internet.
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!