The "Libre" draft has always felt rather unserious to me, in various ways. This seems like one more bit of empirical underpinning for my preconceptions.
The "Libre" draft has always felt rather unserious to me, in various ways. This seems like one more bit of empirical underpinning for my preconceptions.
The v6 format is totally done, it lives in www.rfc-editor.org/rfc/rfc9580, and there are at least 6 interoperable implementations of it
The IETF side of the PQC-specific schism is datatracker.ietf.org/doc/draft-ie..., and that's in the last stages of the process
The v6 format is totally done, it lives in www.rfc-editor.org/rfc/rfc9580, and there are at least 6 interoperable implementations of it
The IETF side of the PQC-specific schism is datatracker.ietf.org/doc/draft-ie..., and that's in the last stages of the process
For the longest time, some hope remained for a (partial at least) good faith collaborative truce of sorts with GnuPG. But after their (rather recent) break from the PQC standardization, we are probably past any hope for reconciliation.
For the longest time, some hope remained for a (partial at least) good faith collaborative truce of sorts with GnuPG. But after their (rather recent) break from the PQC standardization, we are probably past any hope for reconciliation.
One similar practical thing that people have been doing is moving subkeys from one primary to the next. Binding them to a new "root of trust", so to speak.
One similar practical thing that people have been doing is moving subkeys from one primary to the next. Binding them to a new "root of trust", so to speak.
Analogously, "C" for third-party identity certifications from your primary.
But you can't really stop other users from trusting new subkeys that your primary has bound to itself.
Analogously, "C" for third-party identity certifications from your primary.
But you can't really stop other users from trusting new subkeys that your primary has bound to itself.
There is no meaningful defense within the OpenPGP model of trust against an attacker who brute forces the private parameters of your primary key.
There is no meaningful defense within the OpenPGP model of trust against an attacker who brute forces the private parameters of your primary key.
In a less stupid timeline, we'd have this by now. Alas 😩
In a less stupid timeline, we'd have this by now. Alas 😩
However, even RNP has shown no intent to implement GnuPG's PQC (or bare Ed448) formats, as far as I can tell
However, even RNP has shown no intent to implement GnuPG's PQC (or bare Ed448) formats, as far as I can tell
All large distros have moved away from GnuPG for package signature checking, or are in the process of doing so.
This trend seems unlikely to slow down after gpg.fail
All large distros have moved away from GnuPG for package signature checking, or are in the process of doing so.
This trend seems unlikely to slow down after gpg.fail
GnuPG is doing its best to muddy the waters with its attempt at speedrunning its non-IETF PQC design.
GnuPG is doing its best to muddy the waters with its attempt at speedrunning its non-IETF PQC design.