This is an OpenPGP proof that connects my OpenPGP key to this Twtxt account. See for more.
[Verifying my OpenPGP key: openpgp4fpr:20AE2F310A74EA7CEC3AE69F8B3B0604F164E04F]
@prologic (#jmgdkdq) this is a go version of Keyoxide.org that runs all server side. which is based on work from
OpenPGP has a part of the self signature reserved for notatinal data. which is basically a bunch of key/values.
this site tries to emulate the identity proofs of keybase but in a more decentralized/federation way.
my next steps are to have this project host WKD keys which is kinda like a self hosting of your pgp key that are also discoverable with http requests.
then to add a new notation for following other keys. where you can do a kind of web of trust.
matched #ppoatfa score:7.7
Search by:
Search by 1 mentions:
(#jmgdkdq) @prologic it is some interesting work to decentralize all the things.. tricky part is finding tooling. i am using a self hacked version of the go openpgp library. A tool to add and remove notations would need to be local since it needs your private key.
matched #x64m54q score:7.7
Search by:
Search by 1 mentions:
(#jmgdkdq) @xuu @prologic something that would be interesting would be libravatar for the user image. i made one that does the same for a profile cover image.
matched #xrzp7tq score:7.7
Search by:
Search by 2 mentions:
(#jmgdkdq) @prologic huh.. true.. the email is md5/sha256 before storing.. if twtxt acted as provider you would store that hash and point the SRV record to the pod. .. to act as a client it would need to store the hash and the server that hosts the image.
matched #cs7j4sa score:7.7
Search by:
Search by 1 mentions: