My two cents on OpenPGP

TL;DR As of today, March 10, 2017, all my git commits will be cryptographically signed. I’ve also configured GitHub to verify them. You can access them either from Keybase or on the blog’s Keys page.

If you want to know why I started to do so, read on.

OpenPGP

OpenPGP is a non-proprietary protocol for encrypting email communication using public key cryptography. It is based on the original PGP (Pretty Good Privacy) software. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.

As an IETF Proposed Standard RFC 4880, OpenPGP can be implemented by any company without paying any licensing fees to anyone. One of the most common implementations is GnuPG.

GnuPG

GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

Versions

There are three version in the wild: classic, stable & modern. All versions implement the OpenPGP protocol, so it doesn’t really matter which one you use to generate keys.

classic (1.4) is the old, single binary version which may build even on ancient Unix platforms. It has no dependencies like the newer versions. However, it lacks many modern features.

stable (2.0) is the modularized version of GnuPG classic, supporting OpenPGP, S/MIME, and Secure Shell.

modern (2.1) is the brand new version with enhanced features like support for Elliptic Curve Cryptography. It will eventually replace the current stable.

Keybase

A public directory of publicly auditable public keys. All paired, for convenience, with unique usernames. Keybase is built upon the venerable and battle-hardened GNU Privacy Guard.

Keybase allows users to easily encrypt, decrypt and share messages within a tried-and-tested encryption standard. Furthermore, all public keys are tied to user accounts on the Keybase websites, in addition to Twitter and Github accounts.

! If you’ve never heard about Keybase, go ahead and read Playing with Keybase.io.

Why sign my git commits?

A person with enough privileges can alter any git commit, including my own.
Also, It’s entirely possible that someone could compromised my account and commit malicious code on my behalf. I want to verify my work to avoid such incidents.

If you think that’s an exaggeration, you should definitely read Mike Gerwitz‘s Git Horror Story. For the impatient, here’s the summary:

How do I start?

Once you decide to sign your commits, go through the following:

! Please don’t upload your private key to Keybase, ok?
! Don ‘t forget to submit your key to a public key server: OpenPGP, MIT, SKS, etc.

If you really want to go the extra mile, consider buying a YubiKey (I’m not there yet)