Many free projects use OpenPGP encryption or signatures for various important tasks, like defining membership, authenticating participation, asserting identity over a vote, etc. The Web-of-Trust upon which its operation is based is a model many of us hold dear, allowing for a decentralized way to assign trust to the identity of a given person. But both the Web-of-Trust model and the software that serves as a basis for the above mentioned uses are at risk due to attacks on the key distribution protocol (not on the software itself!) With this talk, I will try to bring awareness to this situation, to some possible mitigations, and present some proposals to allow for the decentralized model to continue to thrive towards the future
peer reviewedPretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offerin...
The Debian project is one of the largest free software undertakings worldwide. It is geographically ...
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. I...
While the most common transitive trust model for identity validation in use over Internet is the hea...
The Debian project is one of the heaviest users of the OpenPGP Web-of-Trust (WoT): Not only we use O...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
Trust networks are possible solutions for the key authenticity problem in a decentralized public-key...
The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for t...
In this paper we present a trust management scheme, derived from the horizontal and almost anarchic ...
Abstract The Debian project is one of the largest free software undertakings worldwide. It is geogra...
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptog...
peer reviewedPretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offerin...
The Debian project is one of the largest free software undertakings worldwide. It is geographically ...
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. I...
While the most common transitive trust model for identity validation in use over Internet is the hea...
The Debian project is one of the heaviest users of the OpenPGP Web-of-Trust (WoT): Not only we use O...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
The OpenPGP protocol provides a long time adopted and widespread tool for secure and authenticated ...
Trust networks are possible solutions for the key authenticity problem in a decentralized public-key...
The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for t...
In this paper we present a trust management scheme, derived from the horizontal and almost anarchic ...
Abstract The Debian project is one of the largest free software undertakings worldwide. It is geogra...
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptog...
peer reviewedPretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offerin...
The Debian project is one of the largest free software undertakings worldwide. It is geographically ...
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. I...