<rss
      xmlns:atom="http://www.w3.org/2005/Atom"
      xmlns:media="http://search.yahoo.com/mrss/"
      xmlns:content="http://purl.org/rss/1.0/modules/content/"
      xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      version="2.0"
    >
      <channel>
        <title><![CDATA[freedomfete@npub.cash]]></title>
        <description><![CDATA[Onchain
Layer-2
Liquid
Accepted
☆.𓋼𓍊 𓆏 𓍊𓋼𓍊.☆
Passionate about Learninglanguages and writing, I'm dedicated to programming and literature adjunction. With a background in web development, I thrive on the moments when I discover my spontaneity.

🌐 Let's Connect:

Npub Address: freedomfete@npub.cash
Email Address: https://flowcrypt.com/me/parityday
Lightning Address: parityday@vlt.ge

Feel free to reach out for collaboration opportunities, inquiries, or just to say hello! 🚀✨]]></description>
        <link>https://npub.libretechsystems.xyz/tag/socialweboftrust/</link>
        <atom:link href="https://npub.libretechsystems.xyz/tag/socialweboftrust/rss/" rel="self" type="application/rss+xml"/>
        <itunes:new-feed-url>https://npub.libretechsystems.xyz/tag/socialweboftrust/rss/</itunes:new-feed-url>
        <itunes:author><![CDATA[▄︻デʟɨɮʀɛȶɛֆƈɦ-ֆʏֆȶɛʍֆ══━一,]]></itunes:author>
        <itunes:subtitle><![CDATA[Onchain
Layer-2
Liquid
Accepted
☆.𓋼𓍊 𓆏 𓍊𓋼𓍊.☆
Passionate about Learninglanguages and writing, I'm dedicated to programming and literature adjunction. With a background in web development, I thrive on the moments when I discover my spontaneity.

🌐 Let's Connect:

Npub Address: freedomfete@npub.cash
Email Address: https://flowcrypt.com/me/parityday
Lightning Address: parityday@vlt.ge

Feel free to reach out for collaboration opportunities, inquiries, or just to say hello! 🚀✨]]></itunes:subtitle>
        <itunes:type>episodic</itunes:type>
        <itunes:owner>
          <itunes:name><![CDATA[▄︻デʟɨɮʀɛȶɛֆƈɦ-ֆʏֆȶɛʍֆ══━一,]]></itunes:name>
          <itunes:email><![CDATA[▄︻デʟɨɮʀɛȶɛֆƈɦ-ֆʏֆȶɛʍֆ══━一,]]></itunes:email>
        </itunes:owner>
            
      <pubDate>Sun, 23 Feb 2025 04:00:00 GMT</pubDate>
      <lastBuildDate>Sun, 23 Feb 2025 04:00:00 GMT</lastBuildDate>
      
      <itunes:image href="https://image.nostr.build/4b98ff743d2220977596fa08663e1e3d56680e7d19738fbaeb20743d2703cac0.jpg" />
      <image>
        <title><![CDATA[freedomfete@npub.cash]]></title>
        <link>https://npub.libretechsystems.xyz/tag/socialweboftrust/</link>
        <url>https://image.nostr.build/4b98ff743d2220977596fa08663e1e3d56680e7d19738fbaeb20743d2703cac0.jpg</url>
      </image>
      <item>
      <title><![CDATA[Usage and Use Cases for Hockeypuck OpenPGP Public Keyserver:OpenPGP Keyserver for Bitcoin & Nostr Applications In An Ideal World]]></title>
      <description><![CDATA[PGP public keys for secure communication]]></description>
             <itunes:subtitle><![CDATA[PGP public keys for secure communication]]></itunes:subtitle>
      <pubDate>Sun, 23 Feb 2025 04:00:00 GMT</pubDate>
      <link>https://npub.libretechsystems.xyz/post/openpgpkeyserver/</link>
      <comments>https://npub.libretechsystems.xyz/post/openpgpkeyserver/</comments>
      <guid isPermaLink="false">naddr1qqgy7ur9degyw5rtv4uhxetjwejhyq3q6d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgqxpqqqp65wt0x5rw</guid>
      <category>P2P</category>
      
        <media:content url="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fimg.freepik.com%2Fvrije-vector%2Fhockey-puck_1975-204.jpg%3Fsize%3D626%26ext%3Djpg&amp;f=1&amp;nofb=1&amp;ipt=b565544c6a5c5feab4eebbefef96aacdf58ddadc77ccbb745a2984553e95694f&amp;ipo=images" medium="image"/>
        <enclosure 
          url="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fimg.freepik.com%2Fvrije-vector%2Fhockey-puck_1975-204.jpg%3Fsize%3D626%26ext%3Djpg&amp;f=1&amp;nofb=1&amp;ipt=b565544c6a5c5feab4eebbefef96aacdf58ddadc77ccbb745a2984553e95694f&amp;ipo=images" length="0" 
          type="" 
        />
      <noteId>naddr1qqgy7ur9degyw5rtv4uhxetjwejhyq3q6d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgqxpqqqp65wt0x5rw</noteId>
      <npub>npub16d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgq5h4rzv</npub>
      <dc:creator><![CDATA[▄︻デʟɨɮʀɛȶɛֆƈɦ-ֆʏֆȶɛʍֆ══━一,]]></dc:creator>
      <content:encoded><![CDATA[<p>Hockeypuck is an <strong>OpenPGP keyserver</strong> that allows users to publish, search, and retrieve <strong>PGP public keys</strong> for secure communication. It is designed for <strong>federation</strong> with other keyservers and supports a <strong>high-performance, scalable</strong> architecture.  </p>
<hr>
<h2><strong>🛠️ Usage</strong></h2>
<h3><strong>1. Public PGP Key Directory</strong></h3>
<ul>
<li>Organizations, security researchers, and privacy-focused users can <strong>publish and retrieve PGP keys</strong> for encrypted email and document verification.  </li>
<li>Similar to <strong>SKS Keyserver</strong>, but actively maintained and more scalable.</li>
</ul>
<h3><strong>2. Enterprise PGP Key Management</strong></h3>
<ul>
<li>Companies can <strong>host a private keyserver</strong> for internal teams to share PGP keys securely.  </li>
<li>Prevents reliance on external keyservers like keys.openpgp.org.</li>
</ul>
<h3><strong>3. Decentralized Identity and Key Distribution</strong></h3>
<ul>
<li>Used in federated <strong>PGP keyserver networks</strong> like <strong>Hockeypuck &amp; SKS pools</strong> to distribute OpenPGP keys across multiple servers.  </li>
<li>Useful for <strong>distributed trust models</strong> where multiple organizations manage keys collaboratively.</li>
</ul>
<h3><strong>4. Bitcoin &amp; Nostr Applications</strong></h3>
<ul>
<li>Can be used alongside <strong>Nostr</strong> for key verification, ensuring public keys are retrievable for cryptographic signatures.  </li>
<li>Useful in <strong>Bitcoin</strong> applications where PGP-signed messages confirm identity.</li>
</ul>
<h3><strong>5. Software Package Signing</strong></h3>
<ul>
<li>Developers and package maintainers can <strong>sign software updates</strong> using OpenPGP, and end users can fetch public keys from Hockeypuck to verify authenticity.  </li>
<li>Example: <strong>Debian and Arch Linux package signing</strong>.</li>
</ul>
<h3><strong>6. Secure Messaging</strong></h3>
<ul>
<li>Supports secure email systems using <strong>PGP-encrypted mail (e.g., ProtonMail, Thunderbird + Enigmail, Mailpile, etc.)</strong>.</li>
</ul>
<hr>
<h2><strong>📌 Key Benefits</strong></h2>
<p>✅ <strong>Docker-Based Deployment</strong> → Easily installable with <strong>Docker</strong> and <strong>docker-compose</strong>.<br>✅ <strong>Federated Keyserver</strong> → Can join existing <strong>PGP keyserver networks</strong>.<br>✅ <strong>High-Performance Storage</strong> → Uses PostgreSQL for better performance than older SKS keyservers.<br>✅ <strong>Supports HTTP &amp; HTTPS</strong> → Can be hosted publicly with <strong>TLS encryption</strong>.<br>✅ <strong>Fully Open Source</strong> → Maintained as a modern alternative to SKS.  </p>
<h2><strong>🔑 Signing a Nostr Event Using PGP &amp; Verifying It on a Relay</strong></h2>
<p>If Alice wants to <strong>prove she controls <code>npub1xyz...</code></strong> using <strong>PGP</strong>, she can sign a Nostr event and publish both the event and signature.</p>
<hr>
<h3><strong>🔹 Step 1: Create a Nostr Event (Kind 0)</strong></h3>
<p>Alice generates a <strong>Nostr profile metadata event</strong>:</p>
<pre><code class="language-json">{
  "id": "xxxxxxxxxxxxxxxxxx",
  "pubkey": "npub1xyz...",
  "created_at": 1700000000,
  "kind": 0,
  "tags": [],
  "content": "{ \"name\": \"Alice\", \"about\": \"PGP Verified Nostr User\" }"
}
</code></pre>
<p>She saves this as <strong><code>nostr_event.json</code></strong>.</p>
<hr>
<h3><strong>🔹 Step 2: Sign the Event with PGP</strong></h3>
<p>Alice uses GnuPG to sign the event:</p>
<pre><code class="language-bash">gpg --clearsign --armor nostr_event.json
</code></pre>
<p>This creates <strong><code>nostr_event.json.asc</code></strong>, which contains the event with a <strong>PGP signature</strong>.</p>
<p>🔹 <strong>Example of the signed event:</strong></p>
<pre><code>-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

{
  "id": "xxxxxxxxxxxxxxxxxx",
  "pubkey": "npub1xyz...",
  "created_at": 1700000000,
  "kind": 0,
  "tags": [],
  "content": "{ \"name\": \"Alice\", \"about\": \"PGP Verified Nostr User\" }"
}
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbGSk4HTlMz5tG0tF0Y8fO3HTQYYFAmS8mOkACgkQ0Y8fO3HT
QYYX4w/+JwzbfM1EZ2F7H3yqbdGBJ2cGd...
-----END PGP SIGNATURE-----
</code></pre>
<hr>
<h3><strong>🔹 Step 3: Upload the Signature to a Public Keyserver</strong></h3>
<p>Alice submits her signed Nostr event to the <strong>Hockeypuck keyserver</strong>:</p>
<pre><code class="language-bash">curl --data-binary @nostr_event.json.asc https://keyserver.example.com/pks/add
</code></pre>
<hr>
<h3><strong>🔹 Step 4: Publish the Event to a Nostr Relay</strong></h3>
<p>Alice <strong>publishes the original event</strong> to a Nostr relay:</p>
<pre><code class="language-bash">curl -X POST https://nostr-relay.example.com/ -d @nostr_event.json
</code></pre>
<hr>
<h3><strong>🔹 Step 5: Verification</strong></h3>
<p>Anyone can <strong>fetch Alice’s PGP-signed event</strong> and verify it:</p>
<pre><code class="language-bash">curl "https://keyserver.example.com/pks/lookup?op=get&amp;search=alice@nostr.example.com" | gpg --verify
</code></pre>
<p>If successful, it will show:</p>
<pre><code>gpg: Good signature from "Alice &lt;alice@nostr.example.com&gt;"
</code></pre>
<hr>
<h3><strong>✅ Use Cases</strong></h3>
<ol>
<li><strong>Proving Ownership of a Nostr Public Key</strong> with PGP.</li>
<li><strong>Bitcoin Applications</strong>: PGP-signed messages can confirm identities for multisig coordination.</li>
<li><strong>Decentralized Web of Trust</strong>: Verifying Nostr users via signed events.</li>
</ol>
<hr>
<p>Additionally a simple JS or python script could automate signing process.</p>
]]></content:encoded>
      <itunes:author><![CDATA[▄︻デʟɨɮʀɛȶɛֆƈɦ-ֆʏֆȶɛʍֆ══━一,]]></itunes:author>
      <itunes:summary><![CDATA[<p>Hockeypuck is an <strong>OpenPGP keyserver</strong> that allows users to publish, search, and retrieve <strong>PGP public keys</strong> for secure communication. It is designed for <strong>federation</strong> with other keyservers and supports a <strong>high-performance, scalable</strong> architecture.  </p>
<hr>
<h2><strong>🛠️ Usage</strong></h2>
<h3><strong>1. Public PGP Key Directory</strong></h3>
<ul>
<li>Organizations, security researchers, and privacy-focused users can <strong>publish and retrieve PGP keys</strong> for encrypted email and document verification.  </li>
<li>Similar to <strong>SKS Keyserver</strong>, but actively maintained and more scalable.</li>
</ul>
<h3><strong>2. Enterprise PGP Key Management</strong></h3>
<ul>
<li>Companies can <strong>host a private keyserver</strong> for internal teams to share PGP keys securely.  </li>
<li>Prevents reliance on external keyservers like keys.openpgp.org.</li>
</ul>
<h3><strong>3. Decentralized Identity and Key Distribution</strong></h3>
<ul>
<li>Used in federated <strong>PGP keyserver networks</strong> like <strong>Hockeypuck &amp; SKS pools</strong> to distribute OpenPGP keys across multiple servers.  </li>
<li>Useful for <strong>distributed trust models</strong> where multiple organizations manage keys collaboratively.</li>
</ul>
<h3><strong>4. Bitcoin &amp; Nostr Applications</strong></h3>
<ul>
<li>Can be used alongside <strong>Nostr</strong> for key verification, ensuring public keys are retrievable for cryptographic signatures.  </li>
<li>Useful in <strong>Bitcoin</strong> applications where PGP-signed messages confirm identity.</li>
</ul>
<h3><strong>5. Software Package Signing</strong></h3>
<ul>
<li>Developers and package maintainers can <strong>sign software updates</strong> using OpenPGP, and end users can fetch public keys from Hockeypuck to verify authenticity.  </li>
<li>Example: <strong>Debian and Arch Linux package signing</strong>.</li>
</ul>
<h3><strong>6. Secure Messaging</strong></h3>
<ul>
<li>Supports secure email systems using <strong>PGP-encrypted mail (e.g., ProtonMail, Thunderbird + Enigmail, Mailpile, etc.)</strong>.</li>
</ul>
<hr>
<h2><strong>📌 Key Benefits</strong></h2>
<p>✅ <strong>Docker-Based Deployment</strong> → Easily installable with <strong>Docker</strong> and <strong>docker-compose</strong>.<br>✅ <strong>Federated Keyserver</strong> → Can join existing <strong>PGP keyserver networks</strong>.<br>✅ <strong>High-Performance Storage</strong> → Uses PostgreSQL for better performance than older SKS keyservers.<br>✅ <strong>Supports HTTP &amp; HTTPS</strong> → Can be hosted publicly with <strong>TLS encryption</strong>.<br>✅ <strong>Fully Open Source</strong> → Maintained as a modern alternative to SKS.  </p>
<h2><strong>🔑 Signing a Nostr Event Using PGP &amp; Verifying It on a Relay</strong></h2>
<p>If Alice wants to <strong>prove she controls <code>npub1xyz...</code></strong> using <strong>PGP</strong>, she can sign a Nostr event and publish both the event and signature.</p>
<hr>
<h3><strong>🔹 Step 1: Create a Nostr Event (Kind 0)</strong></h3>
<p>Alice generates a <strong>Nostr profile metadata event</strong>:</p>
<pre><code class="language-json">{
  "id": "xxxxxxxxxxxxxxxxxx",
  "pubkey": "npub1xyz...",
  "created_at": 1700000000,
  "kind": 0,
  "tags": [],
  "content": "{ \"name\": \"Alice\", \"about\": \"PGP Verified Nostr User\" }"
}
</code></pre>
<p>She saves this as <strong><code>nostr_event.json</code></strong>.</p>
<hr>
<h3><strong>🔹 Step 2: Sign the Event with PGP</strong></h3>
<p>Alice uses GnuPG to sign the event:</p>
<pre><code class="language-bash">gpg --clearsign --armor nostr_event.json
</code></pre>
<p>This creates <strong><code>nostr_event.json.asc</code></strong>, which contains the event with a <strong>PGP signature</strong>.</p>
<p>🔹 <strong>Example of the signed event:</strong></p>
<pre><code>-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

{
  "id": "xxxxxxxxxxxxxxxxxx",
  "pubkey": "npub1xyz...",
  "created_at": 1700000000,
  "kind": 0,
  "tags": [],
  "content": "{ \"name\": \"Alice\", \"about\": \"PGP Verified Nostr User\" }"
}
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbGSk4HTlMz5tG0tF0Y8fO3HTQYYFAmS8mOkACgkQ0Y8fO3HT
QYYX4w/+JwzbfM1EZ2F7H3yqbdGBJ2cGd...
-----END PGP SIGNATURE-----
</code></pre>
<hr>
<h3><strong>🔹 Step 3: Upload the Signature to a Public Keyserver</strong></h3>
<p>Alice submits her signed Nostr event to the <strong>Hockeypuck keyserver</strong>:</p>
<pre><code class="language-bash">curl --data-binary @nostr_event.json.asc https://keyserver.example.com/pks/add
</code></pre>
<hr>
<h3><strong>🔹 Step 4: Publish the Event to a Nostr Relay</strong></h3>
<p>Alice <strong>publishes the original event</strong> to a Nostr relay:</p>
<pre><code class="language-bash">curl -X POST https://nostr-relay.example.com/ -d @nostr_event.json
</code></pre>
<hr>
<h3><strong>🔹 Step 5: Verification</strong></h3>
<p>Anyone can <strong>fetch Alice’s PGP-signed event</strong> and verify it:</p>
<pre><code class="language-bash">curl "https://keyserver.example.com/pks/lookup?op=get&amp;search=alice@nostr.example.com" | gpg --verify
</code></pre>
<p>If successful, it will show:</p>
<pre><code>gpg: Good signature from "Alice &lt;alice@nostr.example.com&gt;"
</code></pre>
<hr>
<h3><strong>✅ Use Cases</strong></h3>
<ol>
<li><strong>Proving Ownership of a Nostr Public Key</strong> with PGP.</li>
<li><strong>Bitcoin Applications</strong>: PGP-signed messages can confirm identities for multisig coordination.</li>
<li><strong>Decentralized Web of Trust</strong>: Verifying Nostr users via signed events.</li>
</ol>
<hr>
<p>Additionally a simple JS or python script could automate signing process.</p>
]]></itunes:summary>
      <itunes:image href="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fimg.freepik.com%2Fvrije-vector%2Fhockey-puck_1975-204.jpg%3Fsize%3D626%26ext%3Djpg&amp;f=1&amp;nofb=1&amp;ipt=b565544c6a5c5feab4eebbefef96aacdf58ddadc77ccbb745a2984553e95694f&amp;ipo=images"/>
      </item>
      
      </channel>
      </rss>
    