Hi
user
Admin Login:
Username:
Password:
Name:
My PGP/GPG key is RSA 2048-bit, but I put the private key on Gnuk Token
--client
debian
--show
debconf14
--room room338 8681 --force
Next: 3 Validation and Continuous Integration BoF
show more...
Marks
Author(s):
NIIBE Yutaka
Location
Room 338
Date
aug Thu 28
Days Raw Files
Start
10:00
First Raw Start
10:00
Duration
00:45:00
Offset
0:00:00
End
10:45
Last Raw End
10:45
Chapters
00:00
Total cuts_time
45 min.
https://summit.debconf.org/debconf14/meeting/144/my-pgpgpg-key-is-rsa-2048-bit-but-i-put-the-private-key-on-gnuk-token/
raw-playlist
raw-mp4-playlist
encoded-files-playlist
mp4
svg
png
assets
release.pdf
My_PGPGPG_key_is_RSA_2048bit_but_I_put_the_private_key_on_Gnuk_Token.json
logs
Admin:
episode
episode list
cut list
raw files day
marks day
marks day
image_files
State:
---------
borked
edit
encode
push to queue
post
richard
review 1
email
review 2
make public
tweet
to-miror
conf
done
Locked:
clear this to unlock
Locked by:
user/process that locked.
Start:
initially scheduled time from master, adjusted to match reality
Duration:
length in hh:mm:ss
Name:
Video Title (shows in video search results)
Emails:
email(s) of the presenter(s)
Released:
Unknown
Yes
No
has someone authorised pubication
Normalise:
Channelcopy:
m=mono, 01=copy left to right, 10=right to left, 00=ignore.
Thumbnail:
filename.png
Description:
In this casual session, I will demonstrate Gnuk Token, which is built by Free Software and free hardware design. I will demonstrate NeuG standalone device, which can generate random numbers at 70KiB/s, too. My PGP/GPG key is RSA 2048-bit now. I understand that some person doesn't want to sign my key, because it looks weaker. I develop Gnuk, the firmware for USB Token, which is compatible to OpenPGP card, under GPLv3. My original purpose/goal was not to put a person into a dilemma: computing freedom vs. better security. I think that I have achieved the goal somehow, and it's strong enough (RSA 2048-bit) and it's not that slow (1.4sec to sign), IMO. It is unfortunate for me that Debian community demands RSA 4096-bit or more. Thus, another dilemma is still there; longer key length or better control of private key by Free Software. Good news is that I have implemented Ed25519 (for signing) already, and going to implement Curve25519 (for decryption) in Gnuk. Besides, I am also GnuPG developer, and try to implement Curve25519 support now. It will be good if GnuPG 2.1 will be released and people will enjoy Gnuk Token with Ed25519/Curve25519 until Debconf15 in Germany. During the development of Gnuk, I develop NeuG, the true random number generator to generate private keys on the device. The entropy source is built-in A/D converter. I realized that this feature is very useful, and I build standalone device (just for generating random numbers). FST-01 is a reference board for Gnuk/NeuG. It has STM32F103 as MCU which runs at 72MHz. It has no crypto accelerator. Schematic design and PCB design are available as free hardware design. Material is available at gobby.debian.org: debconf14 -> bof -> gnuk
markdown
Comment:
production notes
2014-08-28/10_00_00.dv
Apply:
10:00:00 - 10:45:04 ( 00:45:04 )
S:
10:00:00 -
E:
10:45:04
D:
00:45:04
show more...
vlc ~/Videos/veyepar/debian/debconf14/dv/room338/2014-08-28/10_00_00.dv :start-time=00.0 --audio-desync=0
Raw File
Cut List
10:00:00
seconds: 0.0
Wall: 10:00:00
Duration
00:45:04
10:45:04
seconds: 0.0
Wall: 10:00:00
Comments:
mp4
mp4.m3u
dv.m3u
Split:
Sequence:
:
delete
Rf filename:
root is .../show/dv/location/, example: 2013-03-13/13:13:30.dv
Sequence:
get this:
check and save to add this
2014-08-28/10_00_00.dv
Veyepar
Video Eyeball Processor and Review