[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
SKS Keyserver Network Under Attack
- Subject: SKS Keyserver Network Under Attack
- From: jnn at synfin.org (John Newman)
- Date: Mon, 01 Jul 2019 20:18:25 +0000
- In-reply-to: <[email protected]>
- References: <ErENdDPhax4kBl76XBxy2L8UIMRBZ9zVM5ZKVhkXKqTuxPjVyX27S5idUdycqcaNHf1GgWJh8bdO1SIie4J4pBv6uS3RtsgIp__-M8F-ufE=@protonmail.com> <[email protected]> <[email protected]>
On July 1, 2019 3:03:25 AM UTC, Mirimir <mirimir at riseup.net> wrote:
>On 06/30/2019 07:40 PM, John Newman wrote:
>> I'm surprised no one has written an sks filesystem (using fuse
>maybe), although it would obviously be horribly inefficient, and a
>total abuse of the system.
>
>They have: https://github.com/yakamok/keyserver-fs ;)
>
><SNIP>
Ack, I should've known ;) I'm not nearly evil enough to
start playing with that code...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 496 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20190701/6c0f95a9/attachment.sig>