can someone verify the gnupg Fingerprint for pubkey?
markr-gnupg at signal100.com
Sat Jun 9 15:29:21 CEST 2012
On 09/06/2012 12:05, michael crane wrote:
> On Sat, June 9, 2012 10:28 am, Mark Rousell wrote:
>> On 07/06/2012 11:27, Werner Koch wrote:
>>> On Wed, 6 Jun 2012 21:54, peter at digitalbrains.com said:
>>> If you look at my OpenPGP mail header you will be pointed to a “finger”
>>> address - enter it into your web browser (in case you don't know what
>>> finger is) and you will see
>> Just as an aside, I presume you are referring to this header line:
>> OpenPGP: id=1E42B367; url=finger:wk at g10code.com
>> Do you know of any common modern browsers that have finger protocol
>> support built in? I wonder, how many people even have a finger client
>> installed (that their browser would be able to find)?
> What types of processes are forbidden by DreamHost?
Err.. sorry, not following you. :-) Who is using Dreamhost and what has
it got to do with the finger protocol? Werner doesn't seem to be using
Dreamhost for what it's worth.
Anyway, I admit that my comment about the finger protocol is not exactly
on-topic but I was just curious about Werner's assumption that the
protocol would be meaningful to an arbitrary browser. For example, even
though I've got a command line finger client on my system none of my
installed browsers know about it. I'd have to manually add a system
mapping for the finger: protocol (and even then I'd also have to add a
wrapper to open the finger client in a persistent shell so I could see
PGP public key: http://www.signal100.com/markr/pgp
Key ID: C9C5C162
More information about the Gnupg-users