moin, moin, see below for what's needed for the key-signing party tomorrow ( Wed ). The two IDs is up to debate. Show up tomorrow to find out why :). ciao, der.hans -- # http://home.pages.de/~lufthans/ http://www.DevelopOnline.com/ # Magic is science unexplained. - der.hans ---------- Forwarded message ---------- Date: Fri, 12 Oct 2001 16:03:37 -0700 From: Austin Godber Reply-To: Arizona State University Linux Users Group To: ASULUG@asu.edu Subject: GPG Key Signing Party - ASULUG **UPDATED** ***I knew there was an bound to be an error somewhere, the URL for more information was wrong in the last revision. It is too windy out here in my new office to type that well.** Key Signing Party There will be a GnuPG key-signing party held during the ASU Linux Users Group Meeting on Wednesday October 17, 2001 after the GPG presentation in the Computing Commons Atrium (room at the south side of CC first floor). Full details at: http://www.public.asu.edu/~auasg/gpg/ What's a key-signing party? A key-signing party is a get-together with PGP users for the purpose of meeting other PGP users and signing each other's keys. This helps to extend the "web of trust" to a great degree. Also, it sometimes serves as a forum to discuss strong cryptography and related issues. Participating: The Participant's Role Summarized 1.Generate A Key Pair 2.Send Public Key To Designated Keyserver (or Coordinator) Use this one -> http://wwwkeys.eu.pgp.net 3.Send Public Key Info To Coordinator 4.Show Up At The Party 5.Verify Your Key Info At The Party 6.Verify Everyone Else's Key Info At The Party 7.Sign All The Verified Keys (Not at party) 8.Send The Signed Keys Back Up To The Designated Keyserver (or the key owner) What Participants Should Bring to the Party 1.Themselves - you cannot participate virtually 2.Two forms of positive picture ID - a driver's license and passport are good 3.Key ID, Key Type, Hex Fingerprint and Key Size info 4.A Pen/Pencil 5.Do not bring a computer. (See the web page.) Why should I use PGP? You should use PGP, if you need (or want) to protect your personal emails from being read by individuals or entities other than your intended recipient(s). PGP, when used correctly, can provide message privacy, message integrity, message authentication, and to some degree non-repudibility. OK. What are some good applications of PGP? Protection of email traffic of a sensitive nature, such as the coordination of response to ongoing security incidents, requests for DNS modifications, requests for networking changes and exchange of sensitive personal information like SSNs. At the very least, it would be useful to have all such messages signed, so the recipients could be sure that the notes were not forged. Graphs of the Web of Trust formed at this and future keysigning partys at ASU are available from: http://www.public.asu.edu/~auasg/gpg/ Please forward this note to anyone who may be interested in attending. Austin Godber godber@asu.edu PS - If anyone notices anything wrong or misleading in this or any other information I provide please feel free let me know.