this post was submitted on 13 Sep 2023
40 points (93.5% liked)
Privacy
31935 readers
1026 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
So you have two keys: master and ephemeral key. Both are independent to each other. Mater doesn't expire and ephemeral will have a short period of validity.
You kept the master key secure, and using it to certify the ephemeral key with a expire date?
You still need to publish the master's public key to key server for everyone knows and verify you signed the ephemeral key isn't?
No, they just have to know that the signer hash is the same for each ephemeral key in the chain. If someone required more validation than that, I’d have to share the public key, but in real life that’s never come up.
Please correct me if I misunderstood.
You have one master key (root). This key have strong connection to your identity. However, you kept this in secret.
You have one or more ephemeral keys (edge). You can dedicate each key for different purposes. You sign these keys with the root key.
If I'm not mistaken, it's essentially the "Web of Trust". How do people trust your edge keys without knowing the root's public key by "the signer hash is the same"? While I can see the certification on your edge key, I can't build a trust path as I don't have your root's public key.
I don't really understand "each ephemeral key in the chain". What chain actually? Chain as in " Web of Trust"? Or as in subkeys?