|By signing OpenPGP keys of other people and receiving signatures on your own key, you can strengthen the Web Of Trust.|
|Starts at||2012/12/30 01:00:00 PM|
|Ends at||2012/12/30 02:00:00 PM|
|Add this event to your calendar (iCal)|
TL;DR: Send me an e-mail with your public key before Dec 29th 20:00. That evening, you will receive a list from me you should print out yourself. Don't forget to bring a government-issued ID to the party!
By signing OpenPGP keys of other people and receiving signatures on your own key, you can strengthen the Web Of Trust. This way, more OpenPGP keys are indirectly verifiable to probably belong to the owner they claim to belong to. At a keysigning, you verify the ID's (passport, driver's license, ...) presented to you by other members. You decide your own signing policy, but if you feel confident you wish to proclaim to the world that that person is who he/she claims to be, you sign the key.
Much more information can be had on the web. I only attended a keysigning once (@27C3), and I'm new at organising one. So I don't have a nice piece of informational text to copy-paste here :).
Some people might be concerned about their privacy and people's ability to socially map you. This is your own decision obviously. I'd say anyone really investigating the signatures you make/receive here, will conclude you attended the 29C3 congress.
I intend to use the Sassaman efficient method to organise the keysigning. If you mail me your public key before Dec 29th 20:00, I will collect all public keys and mail you back a list of keys that evening. I'll also send you a direct reply when I see your mail, to confirm I saw it.
You check the MD5 and SHA1 hashes of the list I mail you, make a printout and write down the hashes. Everybody brings their own list. We will verify the hash at the meeting. The list has check boxes; you tick the ones you want to sign. The signing itself you can do at home, on your own secure computer.
Don't forget to bring your government-issued ID! Or even better, two.