GPG Key Signing Party - ASULUG **UPDATED** (fwd)

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: der.hans
Date:  
Subject: GPG Key Signing Party - ASULUG **UPDATED** (fwd)
moin, moin,

see below for what's needed for the key-signing party tomorrow ( Wed ).

The two IDs is up to debate. Show up tomorrow to find out why :).

ciao,

der.hans
--
# http://home.pages.de/~lufthans/ http://www.DevelopOnline.com/
# Magic is science unexplained. - der.hans

---------- Forwarded message ----------
Date: Fri, 12 Oct 2001 16:03:37 -0700
From: Austin Godber <>
Reply-To: Arizona State University Linux Users Group <>
To:
Subject: GPG Key Signing Party - ASULUG **UPDATED**

***I knew there was an bound to be an error somewhere, the URL for more
information was wrong in the last revision. It is too windy out here in
my new office to type that well.**

Key Signing Party


There will be a GnuPG key-signing party held during the ASU Linux Users
Group Meeting on Wednesday October 17, 2001 after the GPG presentation
in the Computing Commons Atrium (room at the south side of CC first
floor).

Full details at:

        http://www.public.asu.edu/~auasg/gpg/


What's a key-signing party?

A key-signing party is a get-together with PGP users for the purpose
of meeting other PGP users and signing each other's keys. This helps
to extend the "web of trust" to a great degree. Also, it sometimes
serves as a forum to discuss strong cryptography and related issues.

Participating:

The Participant's Role Summarized

  1.Generate A Key Pair
  2.Send Public Key To Designated Keyserver (or Coordinator)
    Use this one -> http://wwwkeys.eu.pgp.net
  3.Send Public Key Info To Coordinator
  4.Show Up At The Party
  5.Verify Your Key Info At The Party
  6.Verify Everyone Else's Key Info At The Party
  7.Sign All The Verified Keys (Not at party)
  8.Send The Signed Keys Back Up To The Designated Keyserver (or the key
    owner)


What Participants Should Bring to the Party

  1.Themselves - you cannot participate virtually
  2.Two forms of positive picture ID - a driver's license and passport
are
    good
  3.Key ID, Key Type, Hex Fingerprint and Key Size info
  4.A Pen/Pencil
  5.Do not bring a computer. (See the web page.)


Why should I use PGP?

You should use PGP, if you need (or want) to protect your personal
emails from being read by individuals or entities other than your
intended recipient(s). PGP, when used correctly, can provide message
privacy, message integrity, message authentication, and to some
degree non-repudibility.


OK. What are some good applications of PGP?

Protection of email traffic of a sensitive nature, such as the
coordination of response to ongoing security incidents, requests
for DNS modifications, requests for networking changes and exchange
of sensitive personal information like SSNs. At the very least, it
would be useful to have all such messages signed, so the recipients
could be sure that the notes were not forged.


Graphs of the Web of Trust formed at this and future keysigning partys
at ASU are available from:

        http://www.public.asu.edu/~auasg/gpg/


Please forward this note to anyone who may be interested in
attending.


Austin Godber



PS - If anyone notices anything wrong or misleading in this or any other
information
I provide please feel free let me know.