Mark Van den Borre

At the airport

I don't like places with time limited free wifi. I hate MAC filtering.
# ifconfig wlan0 hw ether 01:02:03:04:05:06

Mark Van den Borre

Serge van Ginderachter

New GPG Key

Hash: SHA1,SHA512

Date: 22 JUNE 2014

For a number of reasons[0], I've recently set up a new OpenPGP key,
and will be transitioning away from my old one.

The old key will continue to be valid for some time, but i prefer all
future correspondence to come to the new one. I would also like this
new key to be re-integrated into the web of trust. This message is
signed by both keys to certify the transition.

the old key was:

sec 1024D/0x8CC387DA097F5468 2004-07-14
Key fingerprint = 0FAC 6A6C D9D5 134C C87E 4FF3 8CC3 87DA 097F 5468

And the new key is:

sec 4096R/0xD08FC082B8E46E8E 2014-06-22 [expires: 2019-06-21]
Key fingerprint = F744 94B0 7042 6B14 BB90 D283 D08F C082 B8E4 6E8E

To fetch the full key from a public key server, you can simply do:

gpg --keyserver --recv-key

If you already know my old key, you can now verify that the new key is
signed by the old one:

gpg --check-sigs 0xD08FC082B8E46E8E

If you don't already know my old key, or you just want to be double
extra paranoid, you can check the fingerprint against the one above:

gpg --fingerprint 0xD08FC082B8E46E8E

If you are satisfied that you've got the right key, and the UIDs match
what you expect, I'd appreciate it if you would sign my key. You can
do that by issuing the following command:

NOTE: if you have previously signed my key but did a local-only
signature (lsign), you will not want to issue the following, instead
you will want to use --lsign-key, and not send the signatures to the

gpg --sign-key 0xD08FC082B8E46E8E

I'd like to receive your signatures on my key. You can either send me
an e-mail with the new signatures (if you have a functional MTA on
your system):

gpg --export 0xD08FC082B8E46E8E | gpg --encrypt -r '$your_fingerprint' --armor | mail -s 'OpenPGP Signatures'

Additionally, I highly recommend that you implement a mechanism to keep your key
material up-to-date so that you obtain the latest revocations, and other updates
in a timely manner. You can do regular key updates by using parcimonie to
refresh your keyring. Parcimonie is a daemon that slowly refreshes your keyring
from a keyserver over Tor. It uses a randomized sleep, and fresh tor circuits
for each key. The purpose is to make it hard for an attacker to correlate the
key updates with your keyring.

I also highly recommend checking out the excellent Riseup GPG best
practices doc, from which I stole most of the text for this transition
message ;-)

Please let me know if you have any questions, or problems, and sorry
for the inconvenience.

If you have a keybase account and if you are into it, you can also check my
keybase page[1].

Serge van Ginderachter


Version: GnuPG v1



Diese Webseite nutzt Launchpad für die Benutzerauthentifizierung.

Wenn Sie noch keinen Launchpad-Account haben, bekommen Sie beim ersten Login die Möglichkeit, einen Account anzulegen.

Wenn Sie vor der Launchpad-Integration einen Account auf unserer Seite hatten, müssen Sie sich manuell einloggen und die Launchpad-OpenID-Identität in Ihrem Account hinzufügen.

Every Ubunteros blogging or publishing anything more or less related to Ubuntu, FOSS and Linux from Belgium is invited to join the Planet. To add your feed(s) to the Planet you should first register at Launchpad and join the Planet Team. Once accepted as a member of the team you will be able to add your feed(s) under the Planet Feeds section of your account page. If necessary, make sure to register a filtered feed to avoid filling the Planet with unrelated content.

Social Networks