We have a long way ahead of us before PQC-resilient #OpenPGP smartcards are available for the normal user. Does #sequoiapgp plan to support the combination of currently available smartcards with PQC-keys stored on disk, similar to what GnuPG offers?
https://lists.gnupg.org/pipermail/gnupg-users/2025-May/067602.html
Opengpg smartcard specs for kyber (PQC) algorithm

@kushal My OpenPGP private key ist stored on my two Yubikeys. I always sign with GnuPG when I commit with git. And, I check my release tarballs and zip files before I sign them:
https://codeberg.org/duxsco/gentoo-installation/src/branch/main/assets/check_sign_release.sh

I publish information on how to fetch my public key:
https://www.duxsco.de/my_openpgp_public_key/

I’d love to use only sequoia-pgp, but I think this will not happen in the foreseeable future due to the use of rust and the difficulties to package sequoia-keystore due to that:
https://bugs.gentoo.org/965482

#gnupg #sequoiapgp

gentoo-installation/assets/check_sign_release.sh at main

gentoo-installation - Gentoo Linux featuring secure boot, measured boot, disk encryption, RAID, a rescue system (with custom chroot.sh), hardened Gentoo (optional) and SELinux (optional)

Codeberg.org

Por lo visto las claves generadas por Proton añaden a los datos de identidad el correo sin respetar los guiones y los puntos del usuario (pero no del dominio) a las claves disponibles en su servidor.

Es decir, si mi dirección es "[email protected]" o "[email protected]", la clave PGP tendrá asociada "[email protected]". Y si el correo asociado a la llave pública y la del destinatario no coinciden, otros clientes PGP se negarán a usarla.

En otras palabras: generad vuestras *propias claves*. Proton sigue permitiendo subir a sus servidores claves autogeneradas btw.

#Proton #OpenPGP #GPG #OpenKeychain #SequoiaPGP #Mozilla #Thunderbird

偶然发现 #Sequoia-PGP 会把我的 dev@(也就是 Secondary UID)显示在 Primary UID 前面。以为是最新签名问题,遂请帝兵(TailsOS、离线主密钥),把 Primary 标记在两个 UID 之间横跳了一下来刷新状态。

结果是没修好。对比实验发现,这可能是 Sequoia 解析
#GPG 格式密钥的固有问题(不会尊重 Primary Tag,纯粹按照字母顺序排列)。

这 Sequoia PGP 怎么这么坏啊(恼 ​

Also, here's a recording of the demo showing a successful #PQC signature: https://youtu.be/svtu1yJpfEg

#FOSDEM #fosdem2026 #distributions #RPM #Sequoia #SequoiaPGP #PKCS11

RPM Signing with post-quantum crypto using Sequoia-PGP and PKCS#11

YouTube

A lot of us have have been complaining about GnuPG for years but https://gpg.fail/ takes no prisoners on all sides🔥

#39c3 #gnupg #gpgfail #sequoiapgp

@iuvi @GnuPG

if Kyber also available in Kleopatra? Thanks

IMHO below:

Who cares? It's often said that the videotape format war and the high-definition optical disc format war were won by whatever the porn industry favoured. I don't know whether this claim about video format wars is true, but I would argue that the LibrePGP vs. RFC 9580 "war" will be won by whatever is favoured by the predominant public key distribution platform.

Currently, that platform is https://keys.openpgp.org which I don't expect to support LibrePGP anytime soon, because it relies on sequoia-openpgp which I don't expect to support the RFC behind LibrePGP as long as it's just an Active Internet-Draft. At least, Sequoia-PGP supported RFC 9580 after it was released in July 2024 (link). So, why should they handle LibrePGP any differently? tbh, even if the RFC behind LibrePGP has the status of a "RFC - Proposed Standard" which I expect it to never get, I don't think Sequoia-PGP will support it.

I for once will rotate my keypair and opt for Sequoia-PGP once this Gentoo bug has been solved. My reasons:

  • I expect for RFC 9580 to remain favoured on the predominant public key platform.
  • I cannot rely on the GnuPG manpage (link).
  • #GnuPG #sequoiapgp

    @Velocifyer @andrewg That's the reason for my plans to switch from #GnuPG to #sequoiapgp, not the #LibrePGP vs #RFC9580 mess. If a RTFM doesn't suffice and it comes down to RTFC (...Code), I am out.

    See GnuPG manpage:

    ❯ gpg --version | head -n 1
    gpg (GnuPG) 2.5.13
    ❯ man gpg | sed -n '/^[[:space:]]*dane/,/^$/p'
    dane Locate a key using DANE, as specified in draft-ietf-dane-openpgpkey-05.txt.

    ... and:

    The lookup result MUST pass DNSSEC validation; if validation reaches any state other than "Secure", the verification MUST be treated as a failure.

    Source: https://datatracker.ietf.org/doc/html/draft-ietf-dane-openpgpkey-05#section-5

    Using DANE to Associate OpenPGP public keys with email addresses

    OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys. This document specifies a method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS Resource Record. Security is provided via DNSSEC.

    IETF Datatracker

    🤚 Free Saturday
    👉 Saturday spent working on Free Software

    Highlights from #Gentoo:
    #Gemato is now compatible with #FreePG and mostly compatible with #SequoiaPGP chameleon.
    • Prepared patches to support FreePG and SequoiaPGP chameleon as "gpg" symlink providers.
    #FlexiBLAS is now enabled by default on ~arch.
    • Finally finished working on #PkgCheck check for missing #PyPI provenance checks.
    • gpy-list-pkg-impls now includes "does this package have tests?" state, can optionally include PythonCompatUpdate results from PkgCheck and output mIRC colors. In other words, our IRC bot will now tell us when dependencies let us port new packages to #Python 3.14, and whether these packages have tests.

    🤚 Wolna sobota
    👉 Sobota z pracą nad Wolnym Oprogramowaniem

    Nowości w #Gentoo:
    #Gemato wspiera #FreePG i w większości #SequoiaPGP chameleon.
    • Przygotowałem wsparcie FreePG i SequoiaPGP chameleon jako dostawców "gpg".
    #FlexiBLAS jest teraz używany domyślnie w ~arch.
    • W końcu dokończyłem sprawdzanie nieużywanych podpisów paczek #PyPI w #PkgCheck.
    • gpy-list-pkg-impls teraz uwzględnia "czy ta paczka ma testy?", może opcjonalnie włączać wyniki PythonCompatUpdate z PkgCheck i stosować kolorki mIRC-a. Innymi słowy, nasz bot IRC-owy będzie podpowiadał nam, kiedy zależności będą umożliwiać portowanie kolejnych paczek na Pythona 3.14, i czy te paczki mają testy.