[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
SKS Keyserver Network Under Attack
- Subject: SKS Keyserver Network Under Attack
- From: aestetix at aestetix.com (aestetix)
- Date: Mon, 1 Jul 2019 22:28:39 +0200
- In-reply-to: <[email protected]>
- References: <ErENdDPhax4kBl76XBxy2L8UIMRBZ9zVM5ZKVhkXKqTuxPjVyX27S5idUdycqcaNHf1GgWJh8bdO1SIie4J4pBv6uS3RtsgIp__-M8F-ufE=@protonmail.com> <[email protected]> <[email protected]> <[email protected]>
*ahem*
https://github.com/aestetix/pgpfs
And the talk where I released it:
https://www.slideshare.net/aestetix/berlinsides2017
On Mon, Jul 01, 2019 at 08:18:25PM +0000, John Newman wrote:
>
>
>On July 1, 2019 3:03:25 AM UTC, Mirimir <mirimir at riseup.net> wrote:
>>On 06/30/2019 07:40 PM, John Newman wrote:
>>> I'm surprised no one has written an sks filesystem (using fuse
>>maybe), although it would obviously be horribly inefficient, and a
>>total abuse of the system.
>>
>>They have: https://github.com/yakamok/keyserver-fs ;)
>>
>><SNIP>
>
>Ack, I should've known ;) I'm not nearly evil enough to
>start playing with that code...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 528 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20190701/ff468252/attachment.sig>