Accessibility
The MIT PGP Public Key Server is widely accessible to users around the world, providing a centralized location for sharing and retrieving public keys.
Reputation
Being one of the oldest and most well-known public key servers, it carries a strong reputation which encourages user trust and widespread use.
Ease of Use
The server offers a straightforward interface that allows for easy submission and searching of public keys, simplifying the management of keys for users.
Promote MIT PGP Public Key Server. You can add any of these badges on your website.
Key servers are a good place to upload your public key and share it with others. These key servers are used to house people’s public keys from all over the world. There are many public key servers like Ubuntu, GnuPG, OpenPGP, and MIT key servers. - Source: dev.to / over 1 year ago
Yeah I was having the same thought on the web form and if it brings additional overhead maintenance, testing, etc which to me would be the same as trying to get some form of PGP working across mail clients. > Having said that, if the problem is the limited PGP infrastructure then I don't see how an ad-hoc protocol that uses the same certificates as the site's HTTPS cert is going to get more adoption. This is the... - Source: Hacker News / almost 2 years ago
Has anyone been able to access the pgp key server at MIT lately? I can't load the page pgp.mit.edu and downforeveryorjustme.com has been telling me it's been down for days. I can't imagine MIT would let this go on for so long. I've actually sent the school two different emails as of lately but they haven't responded. Anyways... Any insight will be greatly appreciated. Source: about 2 years ago
AFAIK the mit.edu keyserver is defunct. Try running the same, but remove the "--keyserver pgp.mit.edu"option. Your .gnupg/gpg.conf file should have a default server specified, but if not, you can add the line. Source: about 2 years ago
The recreation of our universe was done recently and famously using my personal Google Pixel Android smartphone (phone number 1-530-923-0115, United States, T-Mobile.) Your nations technical experts will be able to guide you further by contacting [ravi@cia.gov](mailto:ravi@cia.gov). You can find my public key at MIT’s key server (https://pgp.mit.edu.). Source: over 2 years ago
When I looked around for it I did come across pgp.mit.edu however, when I search for that fingerprint via the web interface, I get "No Results Found" and running that gpg command simply times out the connection for me on my work PC, so I assumed maybe there was a different keyserver I needed. Source: almost 3 years ago
You can normally get publishers' public keys on https://keys.openpgp.org/ or the older https://pgp.mit.edu/. Source: almost 3 years ago
What are the steps to verify the PGP signature? I can't find any instructions on the website. I found a few public keys on http://pgp.mit.edu, but don't know which one to use and how. Source: about 3 years ago
> Basically, imagine a certificate you have on your computer, except it's publicly known, then imagine use cases based on that. We have that? https://pgp.mit.edu/ https://github.com/ceejayoz.keys. - Source: Hacker News / over 3 years ago
IANAL but there is likely precedent for this in how PGP works for email. I can submit a public key associated with the name "KallistiOW KallistiOW@gmail.com" to a keyserver such as MIT's PGP Keyserver. Now any time I send an email signed with my private key, anybody can verify the authenticity of that key by looking me up on the public keyserver. This way, you know without a doubt that the email came from me. Source: over 3 years ago
But the problem you describe is why GPG signatures are a far more secure system of source verification than a SHA 256/512 hash. In order to verify a GPG key, you have to get the known souecs's public key from a PGP/GPG key server like https://pgp.mit.edu, or from the website of the company who makes the software you are downloading and installing, not from something right on the same page you're getting the... Source: over 3 years ago
If you're looking to switch from Windows, Fedora is a good choice. It has excellent hardware support, latest packages and a vibrant community. See /r/fedora . They take security very seriously. Despite the name it is not a meme OS, they have enterprise backing from Red Hat. The core package maintainers also all have keys on the MIT PGP Keyserver with verified identities. So if something bad happens you can hold... Source: over 3 years ago
Go to e.g. https://keys.openpgp.org (this is the recommended one on the Daedalus website, in the instructions for step 5) or https://pgp.mit.edu or another key server that you like. Source: over 3 years ago
The recipient needs your public key in order to send encrypted messages to you. You need your recipient's public key in order to send encrypted messages to them. You can upload your public key to a keyserver (e.g. https://pgp.mit.edu/), send it as an email attachment, host it on your website, or upload it to Pastebin and send the link. You need your private key to decrypt messages that are sent to you, but you... Source: almost 4 years ago
Not sure, but it looks like keys.openpgp.org is up. I found a keyserver still running where I could find my public key (this one: http://pgp.mit.edu/) and uploaded it to the openpgp.org one. This seems rather recent; there's a related post on r/GnuPG. Source: almost 4 years ago
Interesting. Does GDPR affect even key servers outside the EU? How do we know pgp.mit.edu won't be the next key server to be taken down? Source: almost 4 years ago
Pgp.mit.edu doesn't seem to have keys for RVM on it. Source: almost 4 years ago
There is no absolute "this key is valid if I find the key here" server. There are lots of public key servers where you can publish your key independently. Source: almost 4 years ago
People used to submit their keys to http://pgp.mit.edu and https://keyserver.pgp.com back in the day. Source: about 4 years ago
Hello, I am trying to download TOR and follow it's recommendation of verifying it's key signature. however, when I follow instructions and input "gpg --auto-key-locate nodefault,wkd --locate-keys torbrowser@torproject.org" into my command prompt after downloading GnuPG it returns the following: "gpg: keyserver receive failed: Server indicated a failure". No matter what I do I cant seem to get it to pull the... Source: about 4 years ago
Do you know an article comparing MIT PGP Public Key Server to other products?
Suggest a link to a post with product alternatives.
This is an informative page about MIT PGP Public Key Server. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.