docs(mkdocs): add Blackhat USA 2024 conference on Wi-Fi dangers

This commit is contained in:
nopeitsnothing
2025-03-15 11:37:49 -04:00
committed by No
parent 11b6004bba
commit b8c265c929
33 changed files with 1593 additions and 1591 deletions

View File

@@ -1,13 +1,13 @@
# Import
```
$ gpg --import pgp/core-devs/*
```
# Verify
TODO
### All signing keys are signed by the Master Signing Key
TODO
# Import
```
$ gpg --import pgp/core-devs/*
```
# Verify
TODO
### All signing keys are signed by the Master Signing Key
TODO

View File

@@ -1,3 +1,3 @@
Keys no longer in active use:
TODO
Keys no longer in active use:
TODO

View File

@@ -1,4 +1,4 @@
Keys no longer in active use:
than-signing-keys.asc:
- D7939998F78BADB518C1B600B208C4084A2C582D - revoked
Keys no longer in active use:
than-signing-keys.asc:
- D7939998F78BADB518C1B600B208C4084A2C582D - revoked

View File

@@ -1,80 +1,80 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Tue Jul 25 14:51:36 EDT 2023
I am the admin of itsnothing.net (@Unknown@ioc.exchange) and co-admin of THGTOA.
I will update this canary within 1 month.
Latest bitcoin block hash:
00000000000000000000d9330bf8a03ce70cbe5542bddd16558693a43ea32fd3
I am in complete control of all my key material.
All previous keys have been revoked as part of standard OPSEC key rotation procedures.
Do not encrypt communications to my old keys, I will not read them.
The key currently published on my website https://itsnothing.net/pgp.txt with a fingerprint
of C87D87466FD205945CF10A3821AB6B6A6CB2C337, is my only PGP key for public communication.
Permanent record of old and new PGP keys:
the old key was:
pub rsa4096/0xB208C4084A2C582D 2022-11-04 [SC] [expires: 2027-11-03]
Key fingerprint = D793 9998 F78B ADB5 18C1 B600 B208 C408 4A2C 582D
uid [ultimate] Nope <no@anonymousplanet.org>
And the new key is:
pub ed25519/0x21AB6B6A6CB2C337 2023-07-14 [SC]
Key fingerprint = C87D 8746 6FD2 0594 5CF1 0A38 21AB 6B6A 6CB2 C337
uid [ultimate] nopenothinghere@proton.me <nopenothinghere@proton.me>
To fetch the full key, you can simply do:
gpg --keyserver keys.openpgp.org --recv-key 0x21AB6B6A6CB2C337
**
Note: this keyserver is experimental.[0] I still have yet to add this key to
the I2P keyserver pool, and I don't know if I will. If you have previously
signed my key but did a local-only signature (lsign), you will not want to
issue the following, instead you will want to use --lsign-key, and not send
the signatures to the keyserver.
**
gpg --sign-key 0x21AB6B6A6CB2C337
I'd like to receive your signatures on my key. You can either send me an e-mail
with the new signatures (if you have a functional MTA on your system):
gpg --export 0x21AB6B6A6CB2C337 | gpg --encrypt -r 0x21AB6B6A6CB2C337 --armor \
| mail -s 'OpenPGP Signatures' <nopenothinghere@proton.me>
Additionally, I highly recommend that you implement a mechanism to keep your key
material up-to-date so that you obtain the latest revocations, and other updates
in a timely manner. You can do regular key updates by using parcimonie[1] to
refresh your keyring. Parcimonie is a daemon that slowly refreshes your keyring
from a keyserver over Tor. It uses a randomized sleep, and fresh tor circuits
for each key. The purpose is to make it hard for an attacker to correlate the
key updates with your keyring.
I also highly recommend checking out the excellent Riseup GPG best practices
doc, from which I stole most of the text for this transition message ;-)
https://we.riseup.net/riseuplabs+paow/openpgp-best-practices
Please let me know if you have any questions, or problems, and sorry for the
inconvenience.
Nope (Anonymous Planet) <no@anonymousplanet.org>
0. https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
1. https://directory.fsf.org/wiki/Parcimonie
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQTIfYdGb9IFlFzxCjghq2tqbLLDNwUCZMAZwAAKCRAhq2tqbLLD
N3l3AQC28SZK5HHU1o7K36ifOd/OKj97urrMZF+NUkaRmAwQxgEAlIa2y9g0JoQW
epEpViXFDwyWIUfNhVaJwUWjn/DLoAI=
=A72C
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Tue Jul 25 14:51:36 EDT 2023
I am the admin of itsnothing.net (@Unknown@ioc.exchange) and co-admin of THGTOA.
I will update this canary within 1 month.
Latest bitcoin block hash:
00000000000000000000d9330bf8a03ce70cbe5542bddd16558693a43ea32fd3
I am in complete control of all my key material.
All previous keys have been revoked as part of standard OPSEC key rotation procedures.
Do not encrypt communications to my old keys, I will not read them.
The key currently published on my website https://itsnothing.net/pgp.txt with a fingerprint
of C87D87466FD205945CF10A3821AB6B6A6CB2C337, is my only PGP key for public communication.
Permanent record of old and new PGP keys:
the old key was:
pub rsa4096/0xB208C4084A2C582D 2022-11-04 [SC] [expires: 2027-11-03]
Key fingerprint = D793 9998 F78B ADB5 18C1 B600 B208 C408 4A2C 582D
uid [ultimate] Nope <no@anonymousplanet.org>
And the new key is:
pub ed25519/0x21AB6B6A6CB2C337 2023-07-14 [SC]
Key fingerprint = C87D 8746 6FD2 0594 5CF1 0A38 21AB 6B6A 6CB2 C337
uid [ultimate] nopenothinghere@proton.me <nopenothinghere@proton.me>
To fetch the full key, you can simply do:
gpg --keyserver keys.openpgp.org --recv-key 0x21AB6B6A6CB2C337
**
Note: this keyserver is experimental.[0] I still have yet to add this key to
the I2P keyserver pool, and I don't know if I will. If you have previously
signed my key but did a local-only signature (lsign), you will not want to
issue the following, instead you will want to use --lsign-key, and not send
the signatures to the keyserver.
**
gpg --sign-key 0x21AB6B6A6CB2C337
I'd like to receive your signatures on my key. You can either send me an e-mail
with the new signatures (if you have a functional MTA on your system):
gpg --export 0x21AB6B6A6CB2C337 | gpg --encrypt -r 0x21AB6B6A6CB2C337 --armor \
| mail -s 'OpenPGP Signatures' <nopenothinghere@proton.me>
Additionally, I highly recommend that you implement a mechanism to keep your key
material up-to-date so that you obtain the latest revocations, and other updates
in a timely manner. You can do regular key updates by using parcimonie[1] to
refresh your keyring. Parcimonie is a daemon that slowly refreshes your keyring
from a keyserver over Tor. It uses a randomized sleep, and fresh tor circuits
for each key. The purpose is to make it hard for an attacker to correlate the
key updates with your keyring.
I also highly recommend checking out the excellent Riseup GPG best practices
doc, from which I stole most of the text for this transition message ;-)
https://we.riseup.net/riseuplabs+paow/openpgp-best-practices
Please let me know if you have any questions, or problems, and sorry for the
inconvenience.
Nope (Anonymous Planet) <no@anonymousplanet.org>
0. https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
1. https://directory.fsf.org/wiki/Parcimonie
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQTIfYdGb9IFlFzxCjghq2tqbLLDNwUCZMAZwAAKCRAhq2tqbLLD
N3l3AQC28SZK5HHU1o7K36ifOd/OKj97urrMZF+NUkaRmAwQxgEAlIa2y9g0JoQW
epEpViXFDwyWIUfNhVaJwUWjn/DLoAI=
=A72C
-----END PGP SIGNATURE-----

View File

@@ -1,42 +1,42 @@
-----BEGIN PGP PUBLIC KEY BLOCK-----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=2/sU
-----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP PUBLIC KEY BLOCK-----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=2/sU
-----END PGP PUBLIC KEY BLOCK-----