Keysigning party

From Wiki | LUG@UCLA
Revision as of 22:38, 31 October 2013 by (Talk)

Jump to: navigation, search
Gnupg logo.svg

Note Note: This page is for planning a keysigning party hosted by LUG@UCLA.

A keysigning party is an event for helping people verify each others' PGP keys and strengthening the web of trust.

  • take control of your privacy
  • meet other interesting members of the privacy-aware community
  • pizza

Event information

  • Where: Boelter Hall 4760
  • When: TBA


Way before the party

  1. create a PGP key if you haven't already: $ gpg --gen-key
  2. sync your public key with keyservers: $ gpg --send-keys $YOUR_KEY_ID
    WARNING: this is irreversible. Make sure you are prepared to protect your private key and you are using a very strong passphrase.
  3. submit your public key to LUG@UCLA:

Right before the party

  1. download the keylist and keylist hash
    $ wget
    $ wget
  2. check to see if your key ID is on the list next to your name
  3. personally verify the hash: $ sha1sum --check keylist.txt.sha1
  4. add the hash to the bottom of keylist.txt: $ cat keylist.txt.sha1 >>keylist.txt
  5. print keylist.txt and keep safe

During the party

  1. bring the printed copy of keylist.txt
  2. bring one or more forms of ID (e.g. drivers license + Bruin card)
  3. eat pizza

After the party

  1. retrieve your annotated keylist
  2. for every person on the list with two check marks, import that person's key into your local keyring: $ gpg --search-keys "First Last"


Q: how do I install GnuPG (gpg)?
A: if your operating system doesn't come with GnuPG already installed, you should seriously consider switching to a different operating system. If you're trying to use PGP on Windows or Mac, it kind of defeats the purpose because the software on your computer cannot be trusted to begin with. See Installfest