summaryrefslogtreecommitdiff
path: root/.html/gpg/cool.html
diff options
context:
space:
mode:
Diffstat (limited to '.html/gpg/cool.html')
-rw-r--r--.html/gpg/cool.html146
1 files changed, 146 insertions, 0 deletions
diff --git a/.html/gpg/cool.html b/.html/gpg/cool.html
new file mode 100644
index 0000000..528ce0c
--- /dev/null
+++ b/.html/gpg/cool.html
@@ -0,0 +1,146 @@
+<!DOCTYPE html>
+<html>
+<head>
+ <title>
+ The Codex »
+ GPG Is Pretty Cool
+ </title>
+
+ <link
+ rel='stylesheet'
+ type='text/css'
+ href='http://fonts.googleapis.com/css?family=Buenard:400,700&amp;subset=latin,latin-ext'>
+ <link
+ rel="stylesheet"
+ type="text/css"
+ href="../media/css/reset.css">
+ <link
+ rel="stylesheet"
+ type="text/css"
+ href="../media/css/grimoire.css">
+</head>
+<body>
+
+<div id="shell">
+
+ <ol id="breadcrumbs">
+
+ <li class="crumb-0 not-last">
+
+ <a href="../">index</a>
+
+ </li>
+
+ <li class="crumb-1 not-last">
+
+ <a href="./">gpg</a>
+
+ </li>
+
+ <li class="crumb-2 last">
+
+ cool
+
+ </li>
+
+ </ol>
+
+
+
+ <div id="article">
+ <h1 id="gpg-is-pretty-cool">GPG Is Pretty Cool</h1>
+<p>The GPG software suite is a pretty elegant cryptosystem. It provides:</p>
+<ul>
+<li>
+<p>A standard, well-maintained set of tools for creating and storing keys, and
+ associating them with identities</p>
+</li>
+<li>
+<p>A suite of reliable tools for encrypting, signing, decrypting, and
+ verifying data that can be easily assembled into any combination of
+ integrity checks, authenticity checks, and privacy management</p>
+</li>
+<li>
+<p>A key distribution network that does not rely on hierarchal authority and
+ that can be bootstrapped from scratch quickly and easily</p>
+</li>
+</ul>
+<p>While GPG <a href="terrible">sucks in a number of important ways</a>, it's also the best
+tool we have right now for restoring privacy to private correspondance over
+the internet.</p>
+<h2 id="code-signing">Code Signing</h2>
+<p>Pretty much every Linux distribution relies on GPG for code signing. Rather
+than using GPG's web-of-trust model for key distribution, however, code
+signing with GPG usually creates a hierarchal PKI so that the root keys can
+be shipped with the operating system.</p>
+<p>This works shockingly well, and support for GPG is extremely well integrated
+into common package management systems such as apt and yum.</p>
+<h2 id="source-control">Source Control</h2>
+<p>Which is basically code signing, admittedly, but even Git's support for GPG
+is basically great. Tools like Fossil embed it even deeper, and work quite
+well.</p>
+<h2 id="email">Email</h2>
+<p>GPG's integration with email is surprisingly clever, follows a number of
+long-standing best practices for extending email, and does a <em>very</em> good job
+of providing some guarantees that make sense in a not-terribly-long-ago view
+of email as a communications medium. In particular, if</p>
+<ul>
+<li>who you talk to is not a secret, and</li>
+<li>what, broadly, you are talking about is not a secret, but</li>
+<li>the specifics of the discussion <em>are</em> a secret, and</li>
+<li>all participants are using GPG on their own mailers</li>
+</ul>
+<p>then GPG works brilliantly and modern GPG integration is very effective.</p>
+<p>These assumptions pretty accurately reflect the majority of email use up
+through the late 90s and early 2000s: technical or personal correspondence
+between known acquaintences.</p>
+<p>The internet has moved on from email for casual correspondence, but that
+doesn't invalidate the elegance of GPG's integration for GPG users.</p>
+<h2 id="distributed-verification">Distributed Verification</h2>
+<p>Even though GPG's trust model has some serious privacy costs and concerns, it
+works as a great proof of concept for CA-free identity management. That's
+huge: centralized CAs have even more onerous costs and worse risks than GPG's
+trust network, while offering less transparency to help offset those costs.</p>
+<p>Others have written some pretty interesting things on how to improve GPG's
+trust model and make it less succeptible to errors or key leaks by
+small-to-middling numbers of participants. <a href="https://lists.torproject.org/pipermail/tor-talk/2013-September/030235.html">This
+post</a>
+to tor-talk last year is probably the most complete.</p>
+ </div>
+
+
+
+<div id="comments">
+<div id="disqus_thread"></div>
+<script type="text/javascript">
+ /* * * CONFIGURATION VARIABLES: EDIT BEFORE PASTING INTO YOUR WEBPAGE * * */
+ var disqus_shortname = 'grimoire'; // required: replace example with your forum shortname
+
+ /* * * DON'T EDIT BELOW THIS LINE * * */
+ (function() {
+ var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
+ dsq.src = 'http://' + disqus_shortname + '.disqus.com/embed.js';
+ (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
+ })();
+</script>
+<noscript>Please enable JavaScript to view the <a href="http://disqus.com/?ref_noscript">comments powered by Disqus.</a></noscript>
+<a href="http://disqus.com" class="dsq-brlink">comments powered by <span class="logo-disqus">Disqus</span></a>
+</div>
+
+
+
+ <div id="footer">
+ <p>
+
+ The Codex —
+
+ Powered by <a href="http://markdoc.org/">Markdoc</a>.
+
+<a href="https://bitbucket.org/ojacobson/grimoire.ca/src/master/wiki/gpg/cool.md">See this page on Bitbucket</a> (<a href="https://bitbucket.org/ojacobson/grimoire.ca/history-node/master/wiki/gpg/cool.md">history</a>).
+
+ </p>
+ </div>
+
+</div>
+</body>
+</html> \ No newline at end of file