I should really journal my attempts at using GPG as evidence of how terrible it is from a usability perspective...
-
-
@bascule@matthew_d_green authentication via asymmetric keys is essentially verifying a known signature. reading up on this product and ugh -
@dvanduzer@matthew_d_green using gpg-agent for SSH is a standard GPG feature, as are authentication keys... -
@bascule@matthew_d_green there is no meaningful distinction between "authentication keys" and "signing keys" regardless of context -
@dvanduzer@matthew_d_green even if the signing key is your primary key? -
@bascule@matthew_d_green the primitives for any asymmetric crypto are "sign/verify" and "encrypt/decrypt" -
@dvanduzer@matthew_d_green there are also signing subkeys in addition to auth subkeys! :o -
@dvanduzer@matthew_d_green also I don't make this stuff. I'm just trying to figure out how it works -
@bascule@matthew_d_green oh, I'm not doubting that. keeping crypto obscure is in the commercial interest of crypto vendors.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.