• How does one create a digital sig to sign a post?

    From Fritz Wuehler@fritz@spamexpire-202510.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.privacy on Sun Oct 12 18:54:19 2025
    From Newsgroup: alt.privacy.anon-server

    A PGP public sig is much too large to use.

    Sample of what I see signing a usenet post.

    --- Digital Signature ---
    OThxFc450sbAOrCMzbb72qQ7lehFySEQ/
    lFaF8vuqkeG5WfHyF9e9UT5wbeLMbU6SIR2dwHrQiBjxipUckMNcB==

    ?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@bounce.me@radio-eriwan.ru to alt.privacy.anon-server,alt.privacy on Sun Oct 12 17:30:57 2025
    From Newsgroup: alt.privacy.anon-server

    Fritz Wuehler wrote:
    A PGP public sig is much too large to use.

    Sample of what I see signing a usenet post.

    --- Digital Signature ---
    OThxFc450sbAOrCMzbb72qQ7lehFySEQ/
    lFaF8vuqkeG5WfHyF9e9UT5wbeLMbU6SIR2dwHrQiBjxipUckMNcB==

    ?


    This signature probably requires that you need the public
    key to verify it.

    Another approach with larger signatures is using yubicrypt,
    which embedds the key in the signature, so that you don't
    have to collect the keys and additionally yubicrypt shows
    you an identicon, so that you know those come from your
    friends. Thus allowing you anonymous signatures, when not
    giving away the public key.

    https://github.com/Ch1ffr3punk/yubicrypt

    Regards
    Stefan

    -----BEGIN ED25519 SIGNATURE----- 1b3b2ffc05ffd4b3783442a628b27db14066ce48727e05480b476b7376a73e28 304c98578a89193305d5d69efa1ffd8477b91ef33a7d89ab46caa4a8d8c475e4 9a3185fc22bab88bf102f77ef91b3fcb5605c5377184bac12f47cd6cdb9e7f06
    -----END ED25519 SIGNATURE-----
    --
    -y-+ -a-+-U-U-+-+ -U -+-A-#-+-#-i-A.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@tcpreset@virebent.invalid to mail2news on Sun Oct 12 18:28:31 2025
    From Newsgroup: alt.privacy.anon-server

    Fritz Wuehler wrote:

    A PGP public sig is much too large to use.

    Sample of what I see signing a usenet post.

    --- Digital Signature ---
    OThxFc450sbAOrCMzbb72qQ7lehFySEQ/
    lFaF8vuqkeG5WfHyF9e9UT5wbeLMbU6SIR2dwHrQiBjxipUckMNcB==

    ?


    I use this:
    https://m2usenet.virebent.art/

    Gabx

    --- Digital Signature --- nfreTXBbpR5K7MjVCyjE5Bwy7QOMT244Tt//1eQzNkUY60jtTqgxMwgxzqV3rnBYZJ31qS+MFA2kOBAqTb+TDw==


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From nobody@nobody@yamn.paranoici.org to alt.privacy.anon-server on Sun Oct 12 19:08:54 2025
    From Newsgroup: alt.privacy.anon-server

    On Sun, 12 Oct 2025 18:54:19 +0200, Fritz Wuehler <fritz@spamexpire-202510.rodent.frell.theremailer.net> wrote:
    A PGP public sig is much too large to use.
    Sample of what I see signing a usenet post.
    --- Digital Signature ---
    OThxFc450sbAOrCMzbb72qQ7lehFySEQ/
    lFaF8vuqkeG5WfHyF9e9UT5wbeLMbU6SIR2dwHrQiBjxipUckMNcB==

    i haven't used pgp for clearsigning plain text since the classic "6.5.8ckt" (2002-05-02), but "gnu privacy guard" <https://gnupg.org> is probably what everyone is using, also, public key repositories are another consideration . . .

    (using Tor Browser 14.5.8)
    https://www.gnupg.org/gph/en/manual/x135.html
    The GNU Privacy Handbook
    Chapter 1. Getting Started
    Making and verifying signatures
    A digital signature certifies and timestamps a document. If the document is >subsequently modified in any way, a verification of the signature will fail. A >digital signature can serve the same purpose as a hand-written signature with the
    additional benefit of being tamper-resistant. The GnuPG source distribution, for
    example, is signed so that users can verify that the source code has not been >modified since it was packaged.
    Creating and verifying signatures uses the public/private keypair in an >operation different from encryption and decryption. A signature is created using
    the private key of the signer. The signature is verified using the corresponding
    public key. For example, Alice would use her own private key to digitally sign >her latest submission to the Journal of Inorganic Chemistry. The associate editor
    handling her submission would use Alice's public key to check the signature to >verify that the submission indeed came from Alice and that it had not been >modified since Alice sent it. A consequence of using digital signatures is that
    it is difficult to deny that you made a digital signature since that would imply
    your private key had been compromised.
    The command-line option --sign is used to make a digital signature. The document
    to sign is input, and the signed document is output.
    alice% gpg --output doc.sig --sign doc
    You need a passphrase to unlock the private key for
    user: "Alice (Judge) <alice@cyb.org>"
    1024-bit DSA key, ID BB7576AC, created 1999-06-04
    Enter passphrase:
    The document is compressed before signed, and the output is in binary format. >Given a signed document, you can either check the signature or check the >signature and recover the original document. To check the signature use the -- >verify option. To verify the signature and extract the document use the --decrypt
    option. The signed document to verify and recover is input and the recovered >document is output.
    blake% gpg --output doc --decrypt doc.sig
    gpg: Signature made Fri Jun 4 12:02:38 1999 CDT using DSA key ID BB7576AC
    gpg: Good signature from "Alice (Judge) <alice@cyb.org>"
    Clearsigned documents
    A common use of digital signatures is to sign usenet postings or email messages.
    In such situations it is undesirable to compress the document while signing it.
    The option --clearsign causes the document to be wrapped in an ASCII-armored >signature but otherwise does not modify the document.
    alice% gpg --clearsign doc
    You need a passphrase to unlock the secret key for
    user: "Alice (Judge) <alice@cyb.org>"
    1024-bit DSA key, ID BB7576AC, created 1999-06-04
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    [...]
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v0.9.7 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    iEYEARECAAYFAjdYCQoACgkQJ9S6ULt1dqz6IwCfQ7wP6i/i8HhbcOSKF4ELyQB1
    oCoAoOuqpRqEzr4kOkQqHRLE/b8/Rw2k
    =y6kj
    -----END PGP SIGNATURE-----
    Detached signatures
    A signed document has limited usefulness. Other users must recover the original
    document from the signed version, and even with clearsigned documents, the signed
    document must be edited to recover the original. Therefore, there is a third >method for signing a document that creates a detached signature. A detached >signature is created using the --detach-sig option.
    alice% gpg --output doc.sig --detach-sig doc
    You need a passphrase to unlock the secret key for
    user: "Alice (Judge) <alice@cyb.org>"
    1024-bit DSA key, ID BB7576AC, created 1999-06-04
    Enter passphrase:
    Both the document and detached signature are needed to verify the signature. The
    --verify option can be to check the signature.
    blake% gpg --verify doc.sig doc
    gpg: Signature made Fri Jun 4 12:38:46 1999 CDT using DSA key ID BB7576AC
    gpg: Good signature from "Alice (Judge) <alice@cyb.org>"
    Encrypting and decrypting documents
    [end quoted plain text]

    (using Tor Browser 14.5.8) https://duckduckgo.com/?q=gnupg+public+key+repository&ia=web&assist=true
    GnuPG public key repositories are online services where users can upload and >share their public keys, allowing others to encrypt messages or verify >signatures. These repositories help facilitate secure communication by enabling
    users to find and import public keys easily. linuxbabe.com jfrog.com
    GnuPG Public Key Repository Overview
    GnuPG (GNU Privacy Guard) is a tool for secure communication and data storage. >It uses a public-private key pair for encryption and signing. Public keys can be
    shared and are stored in public key repositories.
    Key Repositories
    GnuPG supports various public key servers where users can upload and retrieve >public keys. Here are some popular options:
    Keyserver Name Description
    hkps://keyserver.ubuntu.com Default keyserver for Ubuntu users certserver.pgp.com A widely used keyserver for key exchange keys.openpgp.org A general-purpose keyserver for OpenPGP keys
    Using Public Key Repositories
    1. Importing a Public Key: You can import a public key from a keyserver using
    the command:
    gpg --keyserver <keyserver-url> --recv-keys <key-id>
    2. Sending Your Public Key: To share your public key, use:
    gpg --keyserver <keyserver-url> --send-keys <key-id>
    3. Verifying Keys: Always verify the fingerprint of a public key with the owner
    to ensure its authenticity. Use:
    gpg --fingerprint <user-id>
    Best Practices
    Personal Distribution: Ideally, share your public key directly with contacts.
    Email Verification: When uploading your key, verify your email to allow others
    to find your key by email address.
    Using GnuPG and its public key repositories enhances security in digital >communications.
    jfrog.com linuxbabe.com
    [end quoted "search assist"]

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From SEC3@admin@sec3.net to alt.privacy.anon-server,alt.privacy on Sun Oct 12 15:13:44 2025
    From Newsgroup: alt.privacy.anon-server

    On 10/12/25 12:54, Fritz Wuehler wrote:
    A PGP public sig is much too large to use.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512


    If your PGP key is the newer type ECC (Elliptic-curve cryptography)
    you will notice the signature blurb is much smaller in size than
    that generated by the older RSA keys. See this signature.
    -----BEGIN PGP SIGNATURE-----

    iHUEARYKAB0WIQQFZEhMii49uusNvoXJTUIzVag4YwUCaOv8sQAKCRDJTUIzVag4 Y+CWAQC5AGLZRkzuqeZmuuu2deb6r2Ab8+kjNM52o/UipXX8SAEA/YQHuPGbM56m Z+xQaNBF8T0ERNNAPnwOUVPdrD9KqwI=
    =7pJ0
    -----END PGP SIGNATURE-----
    --
    SEC3

    YAMN Help Tutorial - https://www.sec3.net/yamnhelp/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From SEC3@admin@sec3.net to alt.privacy.anon-server,alt.privacy on Sun Oct 12 15:40:50 2025
    From Newsgroup: alt.privacy.anon-server

    On 10/12/25 15:13, SEC3 wrote:
    On 10/12/25 12:54, Fritz Wuehler wrote:
    A PGP public sig is much too large to use.

    If your PGP key is the newer type ECC (Elliptic-curve cryptography)
    you will notice the signature blurb is much smaller in size than
    that generated by the older RSA keys.<snip>


    But far more important than the size of a signature
    is to provider your recipient with a way to verify it.
    A PGP sgnature can only be verified if the author's
    PGP public key is made available for the reader.

    Mine can be downloaded here: <https://keys.openpgp.org/vks/v1/by-fingerprint/0564484C8A2E3DBAEB0DBE85C94D423355A83863>
    --
    SEC3

    YAMN Help Tutorial - https://www.sec3.net/yamnhelp/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@bounce.me@radio-eriwan.ru to alt.privacy.anon-server,alt.privacy on Sun Oct 12 20:28:04 2025
    From Newsgroup: alt.privacy.anon-server

    SEC3 wrote:

    But far more important than the size of a signature
    is to provider your recipient with a way to verify it.
    A PGP sgnature can only be verified if the author's
    PGP public key is made available for the reader.

    But unfortunately this does not prove that they
    key belongs to a person who claims it belongs to
    him, if not publicity signed by third parties.

    My yubicrypt certificates, for example, are eIDAS
    certified, so that the whole world knows the keys
    belong to me. An advantage IMHO the old PGP WoT
    does not have.

    <https://github.com/Ch1ffr3punk/my-yubicrypt-certificates/blob/main/my-yubicrypt-certificates.pdf_signed.pdf>
    --
    Regards
    Stefan

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202510.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.privacy on Mon Oct 13 16:27:52 2025
    From Newsgroup: alt.privacy.anon-server

    In article <1c16decf7cc3cc14784afa80cd176c08@msgid.frell.theremailer.net>
    Fritz Wuehler <fritz@spamexpire-202510.rodent.frell.theremailer.net> wrote:

    A PGP public sig is much too large to use.

    Sample of what I see signing a usenet post.

    --- Digital Signature ---
    OThxFc450sbAOrCMzbb72qQ7lehFySEQ/
    lFaF8vuqkeG5WfHyF9e9UT5wbeLMbU6SIR2dwHrQiBjxipUckMNcB==

    ?

    Thanks all for aswering. I'm figuring it all out.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@bounce.me@oc2mx.net to alt.privacy.anon-server,alt.privacy on Mon Oct 13 18:18:15 2025
    From Newsgroup: alt.privacy.anon-server

    Fritz Wuehler wrote:
    In article <1c16decf7cc3cc14784afa80cd176c08@msgid.frell.theremailer.net> Fritz Wuehler <fritz@spamexpire-202510.rodent.frell.theremailer.net> wrote:

    A PGP public sig is much too large to use.

    Sample of what I see signing a usenet post.

    --- Digital Signature ---
    OThxFc450sbAOrCMzbb72qQ7lehFySEQ/
    lFaF8vuqkeG5WfHyF9e9UT5wbeLMbU6SIR2dwHrQiBjxipUckMNcB==

    ?

    Thanks all for aswering. I'm figuring it all out.


    You're welcome!

    Regards
    Stefan
    --
    https://tilde.club/~pollux/
    --- Synchronet 3.21a-Linux NewsLink 1.2