Yes, everyone should upgrade to PQ encryption now. (Re: gpg4win expired code signing cert; please renew.)
have at anonymous.sex
have at anonymous.sex
Thu Oct 16 21:26:12 CEST 2025
On Thu, 16 Oct 2025 00:55:14 -0400, "Robert J. Hansen"
<rjh at sixdemonbag.org> wrote:
[Attribution restored: Internal quote is <have at anonymous.sex>.]
>>I am remotely/anonymously urging a GnuPG newbie to install gpg4win 5
>>beta[1] with post-quantum encryption; everyone should use PQC
>>*yesterday*.[2]
>
>This is an extreme position. It is also silly. No, everyone does not
>need to switch immediately to PQC. If you want to play around with it,
>feel free: if you have really unusual requirements necessitating Kyber,
>go for it: but please don't think it's recommended or a best practice.
>It's neither.
>
>NSA [...says...]
Silently, catastrophically breaching long-term security for people who
don’t even understand the threat models for retrospective decryption is
*cryptographic malpractice*. Fortunately, the most widely-used FOSS is
now more or less on the ball with the current best practice of PQC; for
a few examples:
* GnuPG: Stable, usable hybrid PQ encryption from v2.5.1, released a
month after the NIST standard. Good to use for the more than the past
year, as of this writing. Upgrade to v2.5.x *now*!
* OpenSSH: PQ encrypton *by default* since *2022-04-08* (v9.0),
available earlier.
* OpenSSL: Stable, usable hybrid PQ encryption in TLS from v3.5.0 LTR.
Upgrade your webserver! Also, the Tor daemon opportunistically uses
this (at only one of its layers of encryption) since v0.4.8.17; Tor node
operators, please upgrade both Tor and OpenSSL.
* Mozilla Firefox and Google Chrome/Chromium: Both support the same
hybrid PQ-encrypting TLS in all recent versions. If you don’t yet have
PQC available in your browser, then you are probably using an ancient
version riddled with known RCE vulns.
* Signal (much though I do not recommend the centralized, non-anonymous
network, they must be praised for this): Hybrid PQ encryption since
2023. Starting almost two and a half years ago.
Do you suggest that all of these projects and their developers wasted
their time? (Plus all of the TLS standarizers at IETF... plus the
engineers at Cloudflare who have been pushing PQC deployment hard...
plus...) It is the logical implication of your actively attempting to
dissuade users from upgrading to a now-standard feature, by ridiculing
upgrade advocacy as “silly” based on your interpretation of NSA-says-so.
Always,
have at anonymous.sex
--
A makeshift way to distribute my current PQ-PGP key:
https://lists.gnupg.org/pipermail/gnupg-users/attachments/20250107/4732a382/attachment.key
01A6D81EEAD7EEEC393DEC1401F4894C154E1B8EE32E9059CA5566792A836823
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 297 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20251016/bdd80ba7/attachment.sig>
More information about the Gnupg-users
mailing list