Me: I made this super secure system to exchange data. Make a private GitHub repo, give yourself and recipients access and share data
Cryptographer: 🤦
C: I made this actually secure New Age program that uses an asymmetric key for encryption, so eavesdroppers have no chance.
Me: Where does the key come from?
C: Dunno it’s just a file. It supports SSH keys so with GitHub slash username dot keys it’s easy to use.
Me: So GitHub can spoof my keys?
C: You decide the risk.
Me: 🤦♂️
@thatandromeda @leak did so.
The problem isn't #Cryptography, but the fact that #TechIlliterates are allowed to use #tech and that leads to the digital equivalent of 12 year olds driving gasoline tankers with neither license nor permit nor experience.
#Malware would not be the widespread issue it is today if we didn't allow the #GAFAMs to groom people into #TechIlliterate #Consoomers!
The problem are people being ignorant and openly hostile to the obvious issues...
@roywig @thatandromeda @leak it is "good enough", cuz we ain't 15 years ago where eberything needed archaic commands.
#Thunderbird integrates #OpenPGP / #GnuPG out of the box for some time.
#Gaijim & #MonoclesChat do support #XMPP - #OMEMO and #PasswordManagers like #Enpass are so easy, it literally took me 5 minutes to explain the use and setup a complete #Noob in it.
People aren't stupid, they are lazy and get groomed into being #TechIlliterate #Consoomers...
That is the problem!
@leak this is why we use burner keys for GPG/email.
anonymity!
@SoniEx2 Because you prefer trust-on-every-use to trust-on-first-use?
GPG is so amazingly hard
@SoniEx2 GPG was a big advancement at the time, as I understand it, even if things like web of trust didn't work out
... But yeah I personally don't use it
@tiraniddo Mastodon is secure, right?
-----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEAvpnaPKLIKdvx98KW68lz8pGaRRcYersNGqPjpifMVjjE8LuC
oXgPU0HePnNTUjpShBnynKCvrtWhN+haKbSp+QWXSxiTrW99HBfAl1MDQyWcukoE
b9Cw6INctVUN4iRvkn9T8E6q174RbcnwA/7yTc7p1NCvw+6B/aAN9l1G2pQXgRdY
C/+G6o1IZEHtWhqzE97nY5QKNuUVD0V09dc5CDYBaKjqetwwv6DFk/GRdOSEd/6b
W+20z0qSHpa3YNW6qSp+x5pyYmDrzRIR03os6DauZkChSRyc/Whvurx6o85D6qpz
ywo8xwNaLZHxTQPgcIA5su9ZIytv9LH2E+lSwwIDAQABAoIBAFml8cD9a5pMqlW3
@saraislet
No problem*
* as long as you're Google
@Aranjedeath There are certain kinds of encryption your clients *definitely* should be using.
... But having been in "interesting" (meaning high-target) industries, key management is definitely something we have to address carefully
@leak why when I hear like a 1Password or LastPass or whatever has a breach I'm like, "Guys... you had ONE job..One! And you just failed it." the fancy crpto & rules matter 0 if the baddies can get at your sekrets. like pw or private keys
I knew a would-be employer who wanted me to install their opaque exe on my box AS ROOT. those folks are not in my life
I knew another would-be employer (where my boss there would have been Chinese-Amer) who wanted me to use THEIR laptop *mailed* to me. NEIN!!