Hello, The deadline has now passed. If you haven't submitted your keys yet, it's too late to get your keys on the list. It's not, however, too late to participate altogether. Bring paper slips or business cards with your gpg fingerprint. Please find the keyring and the list of participants at http://people.debian.org/~anibal/ksp-dc11/ There are 106 people with 139 keys. The table below shows some statistics. The columns are key size, number of keys and percentage. size # % 1024 31 24.80 2048 6 4.80 3072 2 1.60 4096 99 79.20 8192 1 .80 At the end of this message there is an important message from Tom Marble about using strong signatures. Please try his kspsig utility to check the strength of the signatures you may receive. If you need help please post your query to the list or email Daniel Kahn Gillmor, Andrew McMillan and myself. Cheers, Aníbal On Sun, Jul 03, 2011 at 10:05:36AM -0500, Tom Marble wrote: >[...] > Second allow me to make an appeal to have you *remind* people > to use strong signatures. This is very simple, but needs to be done > before people sign keys. I have written a tool, kspsig [0], > to verify signature strength. There was some interest in > including it in signing-party, but that has apparently > languished. > > 1. The key part of your recommendations is the gpg configuration > is adding "cert-digest-algo SHA512" to ~/.gnupg/gpg.conf > > 2. The very important next step to work around a caff bug [1] is > $ mv ~/.caff/gnupghome/gpg.conf ~/.caff/gnupghome/gpg.conf.old > $ ln -s ~/.gnupg/gpg.conf ~/.caff/gnupghome/gpg.conf > > [0] https://github.com/tmarble/kspsig/ > [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=527944
Attachment:
signature.asc
Description: Digital signature