Keyserver.mattrude.com is a subdomain of mattrude.com, which was created on 2004-12-25,making it 19 years ago.
Description:A keyserver for managing OpenPGP keys efficiently...
Keywords:OpenPGP, Keyserver, SKS, Encryption, Security...
Discover keyserver.mattrude.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site
HomePage size: 29.794 KB |
Page Load Time: 0.205173 Seconds |
Website IP Address: 138.68.241.223 |
About SKS USA us.sks-welding.com |
SKS - Join Competitions, Download Games, and Get Updates sks.gtbank.com |
SKS Apps PS2 Apps skins.sksapps.com |
Server: nginx/1.14.0 (Ubuntu) |
Date: Fri, 06 Mar 2020 07:18:44 GMT |
Content-Type: text/html |
Last-Modified: Tue, 03 Mar 2020 18:54:45 GMT |
Transfer-Encoding: chunked |
Connection: keep-alive |
Vary: Accept-Encoding |
ETag: W/"5e5ea7f5-6d44" |
Content-Encoding: gzip |
charset="utf-8"/ |
content="A SKS OpenPGP Keyserver" name="description"/ |
content="width=device-width" name="viewport"/ |
Ip Country: United States |
City Name: Santa Clara |
Latitude: 37.3417 |
Longitude: -121.9753 |
Toggle navigation OpenPGP keyserver About Extracting Keys Submitting Keys Guides Contact Dumps Statistics OpenPGP keyserver Search Key Submit Key Advanced Options Index Options: Show OpenPGP fingerprints Show full-key hashes Only return exact matches Machine readable Index type: Get regular index of matching keys Get verbose index of matching keys retrieve ascii-armored keys retrieve keys by full-key hash × Submit Your OpenPGP Public Key Close Submit Public Key About What is PGP? PGP ( P retty G ood P rivacy) is a method of encrypting and signing data (for example an email) in a secure â end to end â way. This means, the message is encrypted on your computer, using the recipientâs public key, in a way that the e-mail server has no knowledge of the content of the message. The recipient of the message then decrypts the message on their own computer using their private key. OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication, and digital signatures. This document specifies the message formats used in OpenPGP. RFC 4880 PGP Resources GnuPG Homepage - The main location for the OpenPGP Standard PGP Inc. - This historical home of PGP, but has since been sold to Symantec. Email Self-defense - A teaching site to learn how and why you should use PGP for your electronic communication. Wikipedia - Pretty Good Privacy About the Server Pool This server is a member of sks-keyserver.net pgp keyserver pools. The main hkp pool which you should configure your pgp software to use is pool.sks-keyservers.net , or perhaps subset.pool.sks-keyservers.net . The available pools this server is a memeber of are listed below: pool.sks-keyservers.net - The main pool p80.pool.sks-keyservers.net - Servers with port 80 open for HKP access subset.pool.sks-keyservers.net - Servers that are running the lastest version of sks ipv4.pool.sks-keyservers.net - Servers with an IPv4 IP address ipv6.pool.sks-keyservers.net - Servers with an IPv6 IP address na.pool.sks-keyservers.net - Servers located in North America eu.pool.sks-keyservers.net - Servers located in Europe oc.pool.sks-keyservers.net - Servers located in Oceania More information may be found on the SKS Keyservers Pools Overview Page . About this Service This service may be withdrawn at any time and without notice to end-users. (Peers will be notified). End-users should use a pool definition above, such as pool.sks-keyservers.net which will alias into an operational pool. Note: This service is provided free, to the public, in the hopes that it might prove useful. No warranty is provided , nor any offer of continuing service or access. By using this service, you MUST understand that presence of data in the keyserver (pools) in no way connotes trust. Anyone can generate a key, with any name or email address, and upload it. All security and trust comes from evaluating security at the âobject levelâ, via PGP Web-Of-Trust signatures. This keyserver makes it possible to retrieve keys, looking them up via various indices, but the collection of keys in this public pool is KNOWN to contain malicious and fraudulent keys. It is the common expectation of server operators that users understand this and use software which, like all known common OpenPGP implementations, evaluates trust accordingly. This expectation is so common that it is not normally explicitly stated. Extracting Keys How-to extract a key Search Key Submit Key Index Options: Show OpenPGP fingerprints Show full-key hashes Only return exact matches Machine readable Index type: Get regular index of matching keys Get verbose index of matching keys retrieve ascii-armored keys retrieve keys by full-key hash Type the text you want to search for in the Search String box. If you want to look up a key by its hexadecimal KeyID, you have to prefix the ID with 0x Select either the Index or Verbose Index check box. The Verbose option will display signatures on keys. Press the Submit button. The server will return a list of keys matching the search text. The page will have links for every KeyID, and every bracket-delimited identifier (i.e. user@example.com). Clicking on the hypertext link will display an ASCII-armored version of the public key. Extraction caveats The search engine is not the same as that used by the pgp program. It will return information for all keys which contain all the words in the search string. A âwordâ in this context is a string of consecutive alphabetic characters. For example, in the string user@example.com, the words are user , example , and com . This means that some keys you might not expect will be returned. If there was a key in the database for Marc Edu , this would be returned for by the above query. If you do not want to see all these extra matches, you can select "Only return exact matches", and only keys containing the specified search string will be returned. This algorithm does not match partial words in any case. So, if you are used to specifying only part of a long name, this will no longer work. Currently, hypertext links are only generated for the KeyID and for text found between matching brackets. (It is a common convention to put your e-mail address inside brackets somewhere in the key ID string.) Submitting Keys Submitting a public key allows other people to find and download the public key. How-to submit a key Cut-and-paste an ASCII-armored version of your public key into the text box. Press Submit Public Key . That is it! The keyserver will process your request immediately. If you like, you can check that your key exists using the extract procedure. Submit a key to the pool Enter ASCII-armored PGP key here: reset Submit Public Key Notice: When you submit a key to this server, either via that web interface or via HKP, that key will be migrated around the pool to the different servers in the pool. That key will then be stored on each of those servers in addition to this server. Due to the transferring of keys between servers not managed by a central hosts, deleting a key is not possible at this time. If a key were deleted from this server, other servers in the pool will restore the key in order to maintain a complete collection. This is the servers intended behavior. Guides Internal Guides How to build a SKS Keyserver Publish A Public PGP Key via DNS: Public Key Association Publish A Public PGP Key via DNS: DANE Cert Records Publish A Public PGP Key via HTTPS: Web Key Directory (WKD) SKS Key Server Dump Process Adding systemd services on a SKS-Keyserver Build GnuPG 2.1 âmodernâ on Ubuntu A Practical Uses for a One-Time Pad External Guides What is PGP and why should I use it? Itâs not you, itâs me: Why and how to encrypt email you send Installed PGP Client Software EnigMail Project client for Thunderbird (Windows/Mac) PGP Tools client for Apple Mail Outlook Privacy Plugin client for Microsoft Outlook 2010 & 2013 Webmail PGP Clients Mailvelope an extension for Chrome and Firefox webmail clients. Google: end-to-end a chrome webmail PGP extension (my build of End-To-End on the Chrome web store) Contact Contact Information This site is maintained by Matt Rude ( 0x94c32ac158aea35c ). If you would like to report any problems or bugs, please send a email or XMPP messsage to the email address listed in one of my public keys. You may also see my profile on keybase.io/mattrude .My Public PGP Key Information My Default Key: pub ed25519 2019-03-05 [SC] [expires: 2024-03-03] 1B99 1052 9DF4 FE1F E3C6 B037 94C3 2AC1 58AE A35C uid Matt Rude sub cv25519 2019-03-05 [E] [expires: 2024-03-03] Or, you may validate my keys using one of my DANE or PKA DNS records or via WKD . Signed Contact Information A signed copy of this information may be found here , or using my ECC key , may be found here . You may validate these files by running the below commands:...
Domain Name: MATTRUDE.COM Registry Domain ID: 138163788_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.cloudflare.com Registrar URL: http://www.cloudflare.com Updated Date: 2020-01-31T04:48:59Z Creation Date: 2004-12-25T05:24:16Z Registry Expiry Date: 2029-12-25T05:24:16Z Registrar: CloudFlare, Inc. Registrar IANA ID: 1910 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: ALBERT.NS.CLOUDFLARE.COM Name Server: TINA.NS.CLOUDFLARE.COM DNSSEC: signedDelegation DNSSEC DS Data: 2371 13 2 4CE9E6240FB5233747CCA11C92E53656374AA02DB8BD9964E68BE4F4E0FBF5AE >>> Last update of whois database: 2024-05-17T19:46:46Z <<<