Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I've attended security conferences in the past two years wherein representatives of companies that claim to see 80+ percent of all Internet traffic in their threat intel offerings who were presenting about Android malware reverse engineering used short IDs in their slide deck and business cards.

When I mentioned Evil32 to them, they looked at a loss.

https://evil32.com

If this is news to you, don't feel bad. Many infosec conference speakers don't do this right either, and those are the sorts of people you'd expect to get this right.



I'm just some guy, but I've got a stack of cards with my short ID on them - what do I do now? Toss them?


Destroy them carefully and use the opportunity to create new ones with QR codes on them with your full public key (or just the full fingerprint).


I've written software to help me create QR codes for my business card, including PGP, address, web site etc. There are many gotchas, some apps ignore some VCard fields, hence it puts copies into generic comment fields, too. Seems to work OK now. Maybe I should turn this into a web service.

https://github.com/pflanze/vcard-scm




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: