* On 2019 07 Jul 14:43 -0500, Teemu Likonen wrote: > Yes. It is not used very much yet but some organizations like debian.org > and kernel.org have it. I'm learning. Slowly. > SKS keyserver software does not have maintainers and currently it seems > that not much development will happen on the server software. So there's > no point in saying "SKS should do something". It won't. Unless someone > starts writing code again. Until then only clients such as GnuPG can be > updated to handle today's challenges like key signature flooding. > > Some have said that SKS keyservers are dying. They don't vanish > immediately but it's good idea to look and develop alternatives like WKD > or different keyserver implementations like Hagrid in > <https://keys.openpgp.org>. I am now reading https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f and am gaining understanding of why SKS is probably not salvageable. I have just uploaded my signing certificate to https://keys.openpgp.org and right now am waiting to receive an authentication email from the site. It may be an experiment more than anything, but I thought I'd try it. - Nate -- "The optimist proclaims that we live in the best of all possible worlds. The pessimist fears this is true." Web: https://www.n0nb.us GPG key: D55A8819 GitHub: N0NB
Attachment:
signature.asc
Description: PGP signature