|
||
Public KeysI use different keys for different roles/reasons (different mailhosts/accounts). I've made the public portions of these keys available for download from various keyservers. Encryption keys are very useful for verifying user identity and ensuring message integrity. |
||
Search for my keys online You can search for my public keys using any of the publicly available keyservers. Here's are links to some of the key servers available (as of 26 Feb, 2023) online: <https://keys.openpgp.org>, <https://keyserver.pgp.com/vkd/GetWelcomeScreen.event>, <https://keyserver.ubuntu.com>, <https://pgp-servers.net/>, <http://pgp.benny-baumann.de>. Based on correspondence with a respected developer/encryption researcher (Werner Koch), I would recommend that you use <keys.gnupg.net> keyserver above all the others. Use the search functions at these keyservers to search by my name or my email address. Best results are likely obtained by using the gnupg.net site (listed las above/and searching for the key associated with a specific email address). Note: If you see/encounter my 'tollgatecrossing.org' or 'southeastaurora-neighborhoodwatch.org' keys/email addresses, you should know that I no longer use those email addresses, manage those websites, or have rights/registration of those domains. Any email (encrypted or not) sent to those addresses will not be answered by me, and will likely result in a bounce. |
||
In the past, spammers have assaulted my digital identity by forging messages to look like they came from me (this hasn't happened since May of 2008). Ensuring delivery of my email, and allowing for verification of messages sent by me is a priority; as a result, I try to use pgp signed messages (whenever possible) with my email correspondence. Thankfully, there's an open source, free and reliable way to make that happen. There's a group of software developers who devote their time and effort in development of a product called 'GPG Tools' it's a series of applications which enable digital signatures and encryption inside the Mac OS X environment. One of the primary components is GPG Mail. GPG Mail is an open source plugin for Apple Mail. It brings the functionality to sign, verify, encrypt and decrypt email using the OpenPGP standard. I use MacGPG 2.2.41 (1051) and a licensed/paid support version of GPG Mail extension* 8.0b5 (as part of GPG Suite 2024.1b2 / released Dec 24th, 2023) with Apple's Mail.app Version 16.0 (3826.200.121)) and macOS Sonoma 15.1 Sequoia for encryption, decryption, and message authentication. If you would like to correspond in secret, please take note of my Public Keys. Note that Apple's Mail.app email client makes used of the MailKit framework. Apple's Mail.app Version 16.0 (3826.200.121) - Distributed with the macOS Operating System:
Why do I use digital signatures or encryption? Well, I don't use the encryption very often, but I have been known to send myself encrypted email containing passwords or private information (banking and medical information) and I use email encryption when sending information to my tax advisor. In addition to the occassional use of encryption (encrypted email), I use pgp/digital signatures quite frequently. I use digital signatures as a way of ensuring message authenticity and non-repudiation. I'm tired of spammers pretending to be me; even my web hosting providers have 'accused' me of being a spammer (on more than one occassion/all without any actual evidence, just 'reported' by someone). By using these signatures (which uses the message content (upon signing) and a private key to create a signature which can be verified by using my public key) I can assure recipients that the message(s) they received were actually sent be me, and it (the content/payload of the message) hasn't been tampered with in transit. My public keys (all of them) are available on various keyservers. If you have any questions or issues with my keys, please let me know. |
||
What is that "signature.asc" that you sent me? The file (signature.asc - which some recipients see as an attachment) is my PGP electronic signature. It is a simple ASCII (American Standard Code for Information Interchange) file; hence, the extension .asc. There are basically two kinds of PGP signatures: Inline armor, and PGP/MIME attachments. The older, inline signatures can only be used with plain text emails and other text files. They do not authenticate attachments, nor do they work with HTML mail. The advantage of inline signatures is that they do not alarm those unfamiliar with the technology, and are not blocked by servers that strip all attachments. The newer PGP/MIME standard creates a separate signature file (the signature.asc attachment that you might see) that is based on an algorithm which takes as its variables; the data in the document(s), my private key, and if directed to an individual with a known public key, the recipient's public key. To some, the file looks like junk in a text file. Email clients/applications/systems that recognize PGP/MIME automatically decrypt and authenticate the signature, and you never see the attachment. Some Email clients (MUAs / Mail User Agents) automatically recognize PGP signatures (the 'signature.asc' attachement that you saw/see). Some older versions of Microsoft products have not yet incorporated the standard into the application/service (Microsoft seems to think that it's a better idea to use their own proprietary way of encrypting/decrypting messages). There are open and commercial implementations of the PGP/RSA encryption system(s). OpenPGP is implemented through GnuPG, and it's available for a large number of platforms including Linux/Unix, Windows, Mac, and even the PalmOS. Get it or learn more about it at: <https://gnupg.org>. How can I verify the content of an email that has a signature.asc attachment? <https://www.baeldung.com/linux/verify-file-asc-signature> |
||
Return to Feedback Page of Robert's Home Page. Author: Robert L. Vaessen e-mail:
|
||