[openpgp] berlin mail encryption meetup Dec 14-18th / INBOME

holger krekel <holger@merlinux.eu> Tue, 06 December 2016 11:47 UTC

Return-Path: <holger@merlinux.eu>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A32F12996F for <openpgp@ietfa.amsl.com>; Tue, 6 Dec 2016 03:47:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.897
X-Spam-Level:
X-Spam-Status: No, score=-4.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-2.896, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=merlinux.eu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kog5QDv9nAE1 for <openpgp@ietfa.amsl.com>; Tue, 6 Dec 2016 03:47:08 -0800 (PST)
Received: from mail.merlinux.eu (mail.merlinux.eu [IPv6:2a01:4f8:c17:b03::2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E376129451 for <openpgp@ietf.org>; Tue, 6 Dec 2016 03:47:08 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.merlinux.eu (Postfix) with ESMTPSA id A04581004F8; Tue, 6 Dec 2016 11:47:04 +0000 (UTC)
DMARC-Filter: OpenDMARC Filter v1.2.0 mail.merlinux.eu A04581004F8
Authentication-Results: mail.merlinux.eu; dmarc=none header.from=merlinux.eu
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=merlinux.eu; s=default; t=1481024824; bh=99wk85TZeC3e+cet8ArBvO/3I5pRC6q2uPLmISkvy7I=; h=Date:From:To:Subject; b=dL91GxRfRC6wbKoniyO0gJ1A6tsxL93VUv8FWJ2EV5s0o1JthQJkl4Se5Ud/cFve9 ffpf/SbMt13wPd+C9vqNnhAPwCpgNNyPP0OBjR2eX0sPRqiEdYrInNJfJ7nREgBYID 0XzAIhGZicg5hMAj7rsIpXtRTLkgn+UAed25HsqY=
Received: by beto (Postfix, from userid 1000) id 6C3DB4231BC; Tue, 6 Dec 2016 12:47:04 +0100 (CET)
Date: Tue, 06 Dec 2016 12:47:04 +0100
From: holger krekel <holger@merlinux.eu>
To: messaging@moderncrypto.org, openpgp@ietf.org
Message-ID: <20161206114704.GR3538@merlinux.eu>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/IFYbJUPI9qb6vkh6g-Wur8geRZU>
Subject: [openpgp] berlin mail encryption meetup Dec 14-18th / INBOME
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Dec 2016 12:01:16 -0000

Hi all, (cross-post openpgp / messaging),

next week Dec 14-18th a diverse set of programmers, cryptographers and researchers meet to move automatic mail encryption forward.  Their hackathon, unconference and fun hangouts are going to happen at the Onion space in Berlin, see here for more details: https://github.com/mailencrypt/ame2016 .  There still is space.  Also feel free to just drop by in the evenings if you are around Berlin.

The main focus of the 5-day meetup of currently ~15 people is on mail encryption but some are also doing a sub session around federated low-latency messaging on thursday afternoon, featuring Matthew from matrix.org and Dominic from Scuttlebot.io among likely others. 

You'll find within the meeting page this link to draft doc on "in-band-opportunistic-mail-encryption" (INBOME) https://inbome.readthedocs.org/.  I expect a lot of discussion and clarification on its relation to key servers or Werner's web-key-directory approach.  FWIW my personal INBOME involvement grew from my perception that email providers seem not very inclined to operate "certifying" key servers and that making automatic mail encryption efforts dependent on that may mean it never really happens.

best,
holger