<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.extremist.software/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=108.85.224.67</id>
	<title>Noisebridge - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.extremist.software/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=108.85.224.67"/>
	<link rel="alternate" type="text/html" href="https://wiki.extremist.software/wiki/Special:Contributions/108.85.224.67"/>
	<updated>2026-04-06T23:18:45Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.13</generator>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=People&amp;diff=32132</id>
		<title>People</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=People&amp;diff=32132"/>
		<updated>2013-06-21T08:42:08Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Membership}}[[Category:Members]]&lt;br /&gt;
&lt;br /&gt;
The marshmallowy good enjoyables associated with Noisebridge.&lt;br /&gt;
&lt;br /&gt;
This is &#039;&#039;not&#039;&#039; a membership list.  Anyone may add themselves to it.  Its names are maintained solely by those who have added them to it.&lt;br /&gt;
&lt;br /&gt;
Add yourself in alphabetical order by first name.&lt;br /&gt;
&lt;br /&gt;
[[User:SFSlim|Aaron Muszalski]]&lt;br /&gt;
&lt;br /&gt;
[[AdamJODonnell|Adam J. O&#039;Donnell]]&lt;br /&gt;
&lt;br /&gt;
[[User:elgreengeeto|Adam Skory]]&lt;br /&gt;
&lt;br /&gt;
[[User:adamwaters|Adam Waters]]&lt;br /&gt;
&lt;br /&gt;
[[User:awright|Adam J. Wright]]&lt;br /&gt;
&lt;br /&gt;
[[User:OpenBuddha|Al Billings]]&lt;br /&gt;
&lt;br /&gt;
[[User:AlSweigart|Al Sweigart]]&lt;br /&gt;
&lt;br /&gt;
[[User:Orph|Alex Graveley]]&lt;br /&gt;
&lt;br /&gt;
[[User:VonGuard|Alex Handy]]&lt;br /&gt;
&lt;br /&gt;
[[User:Alison|Alison B.]]&lt;br /&gt;
&lt;br /&gt;
[[User:Amouravski|Andrei Mouravski]]&lt;br /&gt;
&lt;br /&gt;
[[User:Adi|Andy Isaacson]]&lt;br /&gt;
&lt;br /&gt;
[[User:Vniow|Ani Niow]]&lt;br /&gt;
&lt;br /&gt;
[[User:LeMonkey|Ari Braginsky]]&lt;br /&gt;
&lt;br /&gt;
[[User:Paulproteus|Asheesh]]&lt;br /&gt;
&lt;br /&gt;
[[User:Yerdua|AudreyPenven]]&lt;br /&gt;
&lt;br /&gt;
[[Usr:Bifrost|Evil Bifrost]]&lt;br /&gt;
&lt;br /&gt;
[[User:Bill|Bill Paul]]&lt;br /&gt;
&lt;br /&gt;
[[User:Endenizen|Brian Ferrell]]&lt;br /&gt;
&lt;br /&gt;
[[User:warner|Brian Warner]]&lt;br /&gt;
&lt;br /&gt;
[[User:caitlyn|Caity]]&lt;br /&gt;
&lt;br /&gt;
[[User:charliep|Charlie Hsu]]&lt;br /&gt;
&lt;br /&gt;
[[User:chris-kun|Chris Bolton]]&lt;br /&gt;
&lt;br /&gt;
[[User:murph|Chris Murphy]]&lt;br /&gt;
&lt;br /&gt;
[[User:chris|Chris Palmer]]&lt;br /&gt;
&lt;br /&gt;
[[User:christie|Christie Dudley]]&lt;br /&gt;
&lt;br /&gt;
[[User:cmaier|Christoph Maier]]&lt;br /&gt;
&lt;br /&gt;
[[User:cobolt|Cobolt]]&lt;br /&gt;
&lt;br /&gt;
[[User:colleen|Colleen Smith]]&lt;br /&gt;
&lt;br /&gt;
[[User:ladyfox14|Cristina Chow]]&lt;br /&gt;
&lt;br /&gt;
[[User:da3mon|damon mccormick]]&lt;br /&gt;
&lt;br /&gt;
[[User:cubes|Daneil C. Silverstein]]&lt;br /&gt;
&lt;br /&gt;
[[User:fdr|Dan Farina]]&lt;br /&gt;
&lt;br /&gt;
[[Daniela Steinsapir]]&lt;br /&gt;
&lt;br /&gt;
[[User:Malaclyps|Danny O&#039;Brien]]&lt;br /&gt;
&lt;br /&gt;
[[User:awkwardwhitejew|Dan Sherizen]]&lt;br /&gt;
&lt;br /&gt;
[[User:Avidd|Davidfine]]&lt;br /&gt;
&lt;br /&gt;
[[DavidMolnar]]&lt;br /&gt;
&lt;br /&gt;
[[User:David415|David Stainton]]&lt;br /&gt;
&lt;br /&gt;
[[User:dr1ce|Dr1ce]]&lt;br /&gt;
&lt;br /&gt;
[[User:edrabbit|Ed Hunsinger]]&lt;br /&gt;
&lt;br /&gt;
[[User:eleddy|Elizabeth Leddy]]&lt;br /&gt;
&lt;br /&gt;
[[User:Eri|Eri Comparri]]&lt;br /&gt;
&lt;br /&gt;
[[User:Eric Vinyl|Eric Vinyl]]&lt;br /&gt;
&lt;br /&gt;
[[User:EkriirkE|Erik Johnson]]&lt;br /&gt;
&lt;br /&gt;
[[User:chaoflow|Florian Friesdorf]]&lt;br /&gt;
&lt;br /&gt;
[[User:Binaryfever|Fred McHale]]&lt;br /&gt;
&lt;br /&gt;
[[User:gpvillamil|Gian Pablo Villamil]]&lt;br /&gt;
&lt;br /&gt;
[[User:glenjarvis|Glen Jarvis]]&lt;br /&gt;
&lt;br /&gt;
[[Greg Albrecht]]&lt;br /&gt;
&lt;br /&gt;
[[User:grey|grey]]&lt;br /&gt;
&lt;br /&gt;
[[User:glamrock|Griffin Boyce]]&lt;br /&gt;
&lt;br /&gt;
[[User:Azureviolin|Hao Zhang]]&lt;br /&gt;
&lt;br /&gt;
[[User:mooflyfoof|Heather Lynch]]&lt;br /&gt;
&lt;br /&gt;
[[Håkon Nilsen]]&lt;br /&gt;
&lt;br /&gt;
[[User:verbal|ian]]&lt;br /&gt;
&lt;br /&gt;
[[User:DejaPu|Isky]]&lt;br /&gt;
&lt;br /&gt;
[[JakeAppelbaum]]&lt;br /&gt;
&lt;br /&gt;
[[User:Jared|Jared Dunne]]&lt;br /&gt;
&lt;br /&gt;
[[Jason Araujo]]&lt;br /&gt;
&lt;br /&gt;
[[User:mightyohm|Jeff Keyzer]]&lt;br /&gt;
&lt;br /&gt;
[[Jeff Tchang]]&lt;br /&gt;
&lt;br /&gt;
[[User:JeffreyATW|Jeffrey Carl Faden]]&lt;br /&gt;
&lt;br /&gt;
[[User:jnny|Jenny Ryan]]&lt;br /&gt;
&lt;br /&gt;
[[User:Jessabella|Jessabella Hancilla]]&lt;br /&gt;
&lt;br /&gt;
[[User:wrecca|Gescykae Welz &#039;formerly Jesse&#039;]]&lt;br /&gt;
&lt;br /&gt;
[[User:Thex|J.C.]]&lt;br /&gt;
&lt;br /&gt;
[[User:joachimp|Joachim Pedersen]]&lt;br /&gt;
&lt;br /&gt;
[[User:jlapenna|Joe LaPenna]]&lt;br /&gt;
&lt;br /&gt;
[[JimStockford]] &lt;br /&gt;
&lt;br /&gt;
[[User:BuddhaHacker|Jonas S Karlsson]]&lt;br /&gt;
&lt;br /&gt;
[[User:Jof|Jonathan Lassoff]]&lt;br /&gt;
&lt;br /&gt;
[[User:aeonsf|John Menerick]]&lt;br /&gt;
&lt;br /&gt;
[[User:Kaufman|John J. Kaufman]]&lt;br /&gt;
&lt;br /&gt;
[[User:jtfoote|Jonathan Foote]]&lt;br /&gt;
&lt;br /&gt;
[[User:jbm|Josh Myer]]&lt;br /&gt;
&lt;br /&gt;
[[User:Jabra|Joshua D. Abraham]]&lt;br /&gt;
&lt;br /&gt;
[[User:keith|keith causey]]&lt;br /&gt;
&lt;br /&gt;
[[User:Kenhaggerty|Ken M. Haggerty]]&lt;br /&gt;
&lt;br /&gt;
[[User:Kreedy|Kevin Reedy]]&lt;br /&gt;
&lt;br /&gt;
[[User:Kimardenmiller|Kim Miller]]&lt;br /&gt;
&lt;br /&gt;
[[User:Kragen|Kragen Javier Sitaker]]&lt;br /&gt;
&lt;br /&gt;
[[User:netsniper|Kristian Erik Hermansen]]&lt;br /&gt;
&lt;br /&gt;
[[User:Gadlen|Lee Sonko]]&lt;br /&gt;
&lt;br /&gt;
[[User:Leif|Leif Ryge]]&lt;br /&gt;
&lt;br /&gt;
[[User:le|Luiz Eduardo]]&lt;br /&gt;
&lt;br /&gt;
[[User:Lizzard|Liz Henry]]&lt;br /&gt;
&lt;br /&gt;
[[Malakkar Vohryzek]]&lt;br /&gt;
&lt;br /&gt;
[[User:Marc|Marc Powell]]&lt;br /&gt;
&lt;br /&gt;
[[User:Mfb|Mark Burdett]]&lt;br /&gt;
&lt;br /&gt;
[[User:Kripto|Mark Cohen]]&lt;br /&gt;
&lt;br /&gt;
[[User:WlfyIT|Matt &amp;quot;Wolfy&amp;quot; Meier]]&lt;br /&gt;
&lt;br /&gt;
[[User:matt|Matt Peterson]]&lt;br /&gt;
&lt;br /&gt;
[[User:theUtherSide|Matthew Downs]]&lt;br /&gt;
&lt;br /&gt;
[[User:Mattbot|Mattbot]]&lt;br /&gt;
&lt;br /&gt;
[[User:Maymay|Meitar &amp;quot;maymay&amp;quot; Moscovitz]]&lt;br /&gt;
&lt;br /&gt;
[[Mendelt Siebenga]]&lt;br /&gt;
&lt;br /&gt;
[[User:Meredith|Meredith scheff]]&lt;br /&gt;
&lt;br /&gt;
[[User:Meyermagic|Meyer S. Jacobs]]&lt;br /&gt;
&lt;br /&gt;
[[User:Micah|Micah]]&lt;br /&gt;
&lt;br /&gt;
[[User:mprados|Michael Prados]]&lt;br /&gt;
&lt;br /&gt;
[[User:MichaelShiloh|Michael Shiloh]]&lt;br /&gt;
&lt;br /&gt;
[[User:MCT|Michael Toren (mct)]]&lt;br /&gt;
&lt;br /&gt;
[[User:Michiexile|Mikael Vejdemo Johansson]]&lt;br /&gt;
&lt;br /&gt;
[[User:maltman23|Mitch Altman]]&lt;br /&gt;
&lt;br /&gt;
[[User:Mlp|Mlp]]&lt;br /&gt;
&lt;br /&gt;
[[User:miloh|R. Miloh Alexander]]&lt;br /&gt;
&lt;br /&gt;
[[User:Reverend Mik|Reverend Mik McAllister]]&lt;br /&gt;
&lt;br /&gt;
[[User:mkw813|Morgan]]&lt;br /&gt;
&lt;br /&gt;
[[User:Tnkgrl|Myriam Joire]]&lt;br /&gt;
&lt;br /&gt;
[[NateLawson]]&lt;br /&gt;
&lt;br /&gt;
[[User:neha|Neha Chriss]]&lt;br /&gt;
&lt;br /&gt;
[[User:flipzagging|Neil Kandalgaonkar]]&lt;br /&gt;
&lt;br /&gt;
[[User:Nickthedude | Nickthedude]]&lt;br /&gt;
&lt;br /&gt;
[[User:Owen|Owen]]&lt;br /&gt;
&lt;br /&gt;
[[User:Enki|Paul Böhm]]&lt;br /&gt;
&lt;br /&gt;
[[User:Pearl|Pearl]]&lt;br /&gt;
&lt;br /&gt;
[[User:Pde|Peter Eckersley]]&lt;br /&gt;
&lt;br /&gt;
[[User:standardusername|Peter Youngmeister]]&lt;br /&gt;
&lt;br /&gt;
[[User:h0mee|Praveen Sinha]]&lt;br /&gt;
&lt;br /&gt;
[[Quinn Norton]]&lt;br /&gt;
&lt;br /&gt;
[[User:rachel|Rachel McConnell]]&lt;br /&gt;
&lt;br /&gt;
[[User:rick|Rick Deacon]]&lt;br /&gt;
&lt;br /&gt;
[[User:Rikke|Rikke Rasmussen]]&lt;br /&gt;
&lt;br /&gt;
[[User:rubin110|Rubin Starset]]&lt;br /&gt;
&lt;br /&gt;
[[User:RyanBagueros|Ryan Bagueros]]&lt;br /&gt;
&lt;br /&gt;
[[User:Topsycatt|Sam Sobell]]&lt;br /&gt;
&lt;br /&gt;
[[User:sethalves|Seth Alves]]&lt;br /&gt;
&lt;br /&gt;
[[User:Schoen|Seth Schoen]]&lt;br /&gt;
&lt;br /&gt;
[[User:Simone|Simone Davalos]]&lt;br /&gt;
&lt;br /&gt;
[[User:skyex|skye x]]&lt;br /&gt;
&lt;br /&gt;
[[User:mrcamuti|Steve Camuti]]&lt;br /&gt;
&lt;br /&gt;
[[User:Mediapathic|Steen]]&lt;br /&gt;
&lt;br /&gt;
[[User:ThOMG|Thom Hastings]]&lt;br /&gt;
&lt;br /&gt;
[[User:Tony Longshanks|Tony Longshanks LeTigre]]&lt;br /&gt;
&lt;br /&gt;
[[User:Unixjazz|Unixjazz]]&lt;br /&gt;
&lt;br /&gt;
[[User:Whimzy|The Whimsical Wizard of ZiP]]&lt;br /&gt;
&lt;br /&gt;
[[User:window|Window Snyder]]&lt;br /&gt;
&lt;br /&gt;
[[User:xndr|Xander Hudson]]&lt;br /&gt;
&lt;br /&gt;
[[User:yan|yan]]&lt;br /&gt;
&lt;br /&gt;
[[User:zephyr|Zephyr]]&lt;br /&gt;
&lt;br /&gt;
[[User:ZandrMilewski|Zandr Milewski]]&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30878</id>
		<title>Gnuk</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30878"/>
		<updated>2013-04-24T21:15:16Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Using Gnuk on Debian Wheezy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is a quick tutorial on how to get your public and private key to work with the Flying Stone Tiny[1] GPG token. All the information here was taken from the complete documentation of Gnuk written by its author[2]. Benefits of the Flying Stone Tiny-01 include: a) keeping your secrets separated from a hard-disk, which is a common medium for the storage of GPG secrets and could potentially represent a major security risk; b) ability to use your keys in multiple computers; c) hardware-lock preventing the secrets to be read from the token; d) it is USB, which means it is (almost) universal, dipensing the need for a Smart Card reader, while having all the benefits of a smart card; d) it is all free software-based (GPLv3), therefore it is not only transparent and widely available, but also free for further improvements and new inventive usages. After completing the tutorial, if you still have questions, access the Q&amp;amp;A forum [3] and check Riseup&#039;s tutorial [7], or just pop-up at #noisebridge on Freenode and ask us.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Check requerements for using the GPG token:&lt;br /&gt;
&lt;br /&gt;
* Your GPG keys must be RSA 2048 bits, if your keys do not met the requirement, generate new keys[4];&lt;br /&gt;
* FST-01 USB token with Gnuk pre-installed;&lt;br /&gt;
* GNU/Linux system (should work on other *nix systems, but not yet tested).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Install the following packages:&lt;br /&gt;
&lt;br /&gt;
* gnupg/gnupg2 (gnupg version &amp;gt;= 1.4 or gnupg2)&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* gnupg-pkcs11-scd (substitute for scdaemon under &#039;Squeeze&#039;)&lt;br /&gt;
* python-pyscard (to use a tool for removing keys)&lt;br /&gt;
      &lt;br /&gt;
&lt;br /&gt;
3. Edit your GPG configuration:&lt;br /&gt;
&lt;br /&gt;
Add the following content to your ~/.gnupg/gpg.conf file:&lt;br /&gt;
   &lt;br /&gt;
     use-agent&lt;br /&gt;
     personal-digest-preferences SHA256&lt;br /&gt;
     cert-digest-algo SHA256&lt;br /&gt;
     default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed&lt;br /&gt;
     default-key ADD_YOUR_KEY_ID_HERE   &lt;br /&gt;
&lt;br /&gt;
4. In order to use the token, make sure you are running gpg-agent, if not:&lt;br /&gt;
&lt;br /&gt;
Run gpg-agent:&lt;br /&gt;
     gpg-agent --daemon --enable-ssh-support&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. If you are planning to use the token to authenticate with OpenSSH&lt;br /&gt;
&lt;br /&gt;
Generate your ssh keys [5]:&lt;br /&gt;
     gpgkey2ssh TYPE_YOUR_SUBKEY_ID_HERE &amp;gt;&amp;gt; sshpubkey.txt&lt;br /&gt;
     &lt;br /&gt;
Add your pub key to the server you want to auth with your GPG token:&lt;br /&gt;
     ssh ~/.ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Personalize your token&lt;br /&gt;
&lt;br /&gt;
To change your personal info, URL where your pub key is, etc., run:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; admin&lt;br /&gt;
     Allow admin commands to be executed&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; name&lt;br /&gt;
     Register name and surname of the token owner&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; url&lt;br /&gt;
     Address for the location of your public keys, important setting to help you register the token in other machines&lt;br /&gt;
 &lt;br /&gt;
     gpg&amp;gt; passwd&lt;br /&gt;
     Set-up your PIN for the usage of the token, please this is not your &#039;passphrase&#039; for the GPG private key&lt;br /&gt;
     The default PIN from the factory is &amp;quot;123456&amp;quot;; your new PIN should not be bigger than 8 characters.&lt;br /&gt;
     It does not have to be numbers -- the acronym PIN is misleading here.&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; forcesig &lt;br /&gt;
     This will change the default setting of &#039;signature force PIN&#039; OFF&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; login&lt;br /&gt;
     Register your login name&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; help&lt;br /&gt;
     This is command is your friend, if you want to further customize the token!&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This will apply the changes&lt;br /&gt;
     &lt;br /&gt;
7. Write your public and private GPG keys to the token&lt;br /&gt;
&lt;br /&gt;
Invoke GPG shell with this command, adding your key ID where indicated:&lt;br /&gt;
     gpg --edit-key TYPE_YOUR_KEY_ID_HERE&lt;br /&gt;
   &lt;br /&gt;
     gpg&amp;gt; keytocard &lt;br /&gt;
     This command will *move* your pub GPG key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; toggle&lt;br /&gt;
     This command changes from pub key to the private key operation&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; keytocard&lt;br /&gt;
     This command will move your private key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This command will save the info to the token and exit the shell&lt;br /&gt;
&lt;br /&gt;
8. Using your keys in other computers with GPG installed&lt;br /&gt;
&lt;br /&gt;
Invoke the GPG shell with this command:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; fetch&lt;br /&gt;
     This command will retrieve your keys and add it to the local GPG keychain&lt;br /&gt;
     &lt;br /&gt;
The key is now registered by your local install of GPG, but you have to set the trust of it:&lt;br /&gt;
     gpg --edit-key TYPE_YOUR_KEY_ID_HERE&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; trust&lt;br /&gt;
     This command will set the key you just installed as &#039;trusted&#039;. Given it is your own key, set it to (5) &#039;ultimate&#039; trust&lt;br /&gt;
          &lt;br /&gt;
9. Before you use the token, make sure you deactivate other gpg agents. Here are some popular agents:&lt;br /&gt;
&lt;br /&gt;
* gnome-keyring (GNOME)&lt;br /&gt;
* kwallet (KDE)&lt;br /&gt;
* seahorse &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Access &#039;/etc/xdg/autostart&#039; and &#039;~/.config/autostart&#039; and add a new entry to the following config files:&lt;br /&gt;
&lt;br /&gt;
Add this line to &#039;gnome-keyring-ssh.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
Add this line to &#039;gnome-keyring-gpg.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
&lt;br /&gt;
11. Common Issues&lt;br /&gt;
&lt;br /&gt;
* If you get &#039;OpenPGP card not available: general error&#039;, try killing gpg-agents, such as gnome-keyring;&lt;br /&gt;
* If you type a wrong PIN three times, you will lock the device permanently, *be extra carefull*!&lt;br /&gt;
* If you need to re-write keys to the token, make sure to delete the keys on it first [6].&lt;br /&gt;
* If you remove your keys from the device, your PIN will be erased as well and reverted to the default PIN (12345678), *remember to change it!*.&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
12. Sources&lt;br /&gt;
&lt;br /&gt;
[1] http://www.seeedstudio.com/wiki/FST-01&lt;br /&gt;
&lt;br /&gt;
[2] http://www.fsij.org/doc-gnuk/&lt;br /&gt;
&lt;br /&gt;
[3] http://no-passwd.net/askbot/questions/scope:all/sort:activity-desc/page:1/&lt;br /&gt;
&lt;br /&gt;
[4] http://keyring.debian.org/creating-key.html&lt;br /&gt;
&lt;br /&gt;
[5] http://www.programmierecke.net/howto/gpg-ssh.html&lt;br /&gt;
&lt;br /&gt;
[6] http://no-passwd.net/askbot/question/51/how-to-deletereplace-the-key-in-gnuk/&lt;br /&gt;
&lt;br /&gt;
[7] https://we.riseup.net/debian/using-the-openpgp-card-with-subkeys&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30877</id>
		<title>Gnuk</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30877"/>
		<updated>2013-04-24T21:13:57Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Using Gnuk on Debian Wheezy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is a quick tutorial on how to get your public and private key to work with the Flying Stone Tiny[1] GPG token. All the information here was taken from the complete documentation of Gnuk written by its author[2]. Benefits of the Flying Stone Tiny-01 include: a) keeping your secrets separated from a hard-disk, which is a common medium for the storage of GPG secrets and could potentially represent a major security risk; b) ability to use your keys in multiple computers; c) hardware-lock preventing the secrets to be read from the token; d) it is USB, which means it is (almost) universal, dipensing the need for a Smart Card reader, while having all the benefits of a smart card; d) it is all free software-based (GPLv3), therefore it is not only transparent and widely available, but also free for further improvements and new inventive usages. After completing the tutorial, if you still have questions, access the Q&amp;amp;A forum [3] and check Riseup&#039;s tutorial [7], or just pop-up at #noisebridge on Freenode and ask us.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Check requerements for using the GPG token:&lt;br /&gt;
&lt;br /&gt;
* Your GPG keys must be RSA 2048 bits, if your keys do not met the requirement, generate new keys[4];&lt;br /&gt;
* FST-01 USB token with Gnuk pre-installed;&lt;br /&gt;
* GNU/Linux system (should work on other *nix systems, but not yet tested).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Install the following packages:&lt;br /&gt;
&lt;br /&gt;
* gnupg/gnupg2 (gnupg version &amp;gt;= 1.4 or gnupg2)&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* gnupg-pkcs11-scd (substitute for scdaemon under &#039;Squeeze&#039;)&lt;br /&gt;
* python-pyscard (to use a tool for removing keys)&lt;br /&gt;
      &lt;br /&gt;
&lt;br /&gt;
3. Edit your GPG configuration:&lt;br /&gt;
&lt;br /&gt;
Add the following content to your ~/.gnupg/gpg.conf file:&lt;br /&gt;
   &lt;br /&gt;
     use-agent&lt;br /&gt;
     personal-digest-preferences SHA256&lt;br /&gt;
     cert-digest-algo SHA256&lt;br /&gt;
     default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed&lt;br /&gt;
     default-key ADD_YOUR_KEY_ID_HERE   &lt;br /&gt;
&lt;br /&gt;
4. In order to use the token, make sure you are running gpg-agent, if not:&lt;br /&gt;
&lt;br /&gt;
Run gpg-agent:&lt;br /&gt;
     gpg-agent --daemon --enable-ssh-support&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. If you are planning to use the token to authenticate with OpenSSH&lt;br /&gt;
&lt;br /&gt;
Generate your ssh keys [5]:&lt;br /&gt;
     gpgkey2ssh TYPE_YOUR_SUBKEY_ID_HERE &amp;gt;&amp;gt; sshpubkey.txt&lt;br /&gt;
     &lt;br /&gt;
Add your pub key to the server you want to auth with your GPG token:&lt;br /&gt;
     ssh ~/.ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Personalize your token&lt;br /&gt;
&lt;br /&gt;
To change your personal info, URL where your pub key is, etc., run:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; admin&lt;br /&gt;
     Allow admin commands to be executed&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; name&lt;br /&gt;
     Register name and surname of the token owner&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; url&lt;br /&gt;
     Address for the location of your public keys, important setting to help you register the token in other machines&lt;br /&gt;
 &lt;br /&gt;
     gpg&amp;gt; passwd&lt;br /&gt;
     Set-up your PIN for the usage of the token, please this is not your &#039;passphrase&#039; for the GPG private key&lt;br /&gt;
     The default PIN from the factory is &amp;quot;123456&amp;quot;; your new PIN should not be bigger than 8 characters.&lt;br /&gt;
     It does not have to be numbers -- the acronym PIN is misleading here.&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; forcesig &lt;br /&gt;
     This will change the default setting of &#039;signature force PIN&#039; OFF&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; login&lt;br /&gt;
     Register your login name&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; help&lt;br /&gt;
     This is command is your friend, if you want to further customize the token!&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This will apply the changes&lt;br /&gt;
     &lt;br /&gt;
7. Write your public and private GPG keys to the token&lt;br /&gt;
&lt;br /&gt;
Invoke GPG shell with this command, adding your key ID where indicated:&lt;br /&gt;
     gpg --edit-key TYPE_YOUR_KEY_ID_HERE&lt;br /&gt;
   &lt;br /&gt;
     gpg&amp;gt; keytocard &lt;br /&gt;
     This command will *move* your pub GPG key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; toggle&lt;br /&gt;
     This command changes from pub key to the private key operation&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; keytocard&lt;br /&gt;
     This command will move your private key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This command will save the info to the token and exit the shell&lt;br /&gt;
&lt;br /&gt;
8. Using your keys in other computers with GPG installed&lt;br /&gt;
&lt;br /&gt;
Invoke the GPG shell with this command:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; fetch&lt;br /&gt;
     This command will retrieve your keys and add it to the local GPG keychain&lt;br /&gt;
     &lt;br /&gt;
The key is now registered by your local install of GPG, but you have to set the trust of it:&lt;br /&gt;
     gpg --edit-key TYPE_YOUR_KEY_ID_HERE&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; trust&lt;br /&gt;
     This command will set the key you just installed as &#039;trusted&#039;. Given it is your own key, set it to (5) &#039;ultimate&#039; trust&lt;br /&gt;
          &lt;br /&gt;
9. Before you use the token, make sure you deactivate other gpg agents. Here are some popular agents:&lt;br /&gt;
&lt;br /&gt;
* gnome-keyring (GNOME)&lt;br /&gt;
* kwallet (KDE)&lt;br /&gt;
* seahorse &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Access &#039;/etc/xdg/autostart&#039; and &#039;~/.config/autostart&#039; and add a new entry to the following config files:&lt;br /&gt;
&lt;br /&gt;
Add this line to &#039;gnome-keyring-ssh.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
   &lt;br /&gt;
Add this line to &#039;gnome-keyring-gpg.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
&lt;br /&gt;
11. Common Issues&lt;br /&gt;
&lt;br /&gt;
* If you get &#039;OpenPGP card not available: general error&#039;, try killing gpg-agents, such as gnome-keyring;&lt;br /&gt;
* If you type a wrong PIN three times, you will lock the device permanently, *be extra carefull*!&lt;br /&gt;
* If you need to re-write keys to the token, make sure to delete the keys on it first [6].&lt;br /&gt;
* If you remove your keys from the device, your PIN will be erased as well and reverted to the default PIN (12345678), *remember to change it!*.&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
12. Sources&lt;br /&gt;
&lt;br /&gt;
[1] http://www.seeedstudio.com/wiki/FST-01&lt;br /&gt;
&lt;br /&gt;
[2] http://www.fsij.org/doc-gnuk/&lt;br /&gt;
&lt;br /&gt;
[3] http://no-passwd.net/askbot/questions/scope:all/sort:activity-desc/page:1/&lt;br /&gt;
&lt;br /&gt;
[4] http://keyring.debian.org/creating-key.html&lt;br /&gt;
&lt;br /&gt;
[5] http://www.programmierecke.net/howto/gpg-ssh.html&lt;br /&gt;
&lt;br /&gt;
[6] http://no-passwd.net/askbot/question/51/how-to-deletereplace-the-key-in-gnuk/&lt;br /&gt;
&lt;br /&gt;
[7] https://we.riseup.net/debian/using-the-openpgp-card-with-subkeys&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30876</id>
		<title>Gnuk</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30876"/>
		<updated>2013-04-24T21:13:01Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Using Gnuk on Debian Wheezy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is a quick tutorial on how to get your public and private key to work with the Flying Stone Tiny[1] GPG token. All the information here was taken from the complete documentation of Gnuk written by its author[2]. Benefits of the Flying Stone Tiny-01 include: a) keeping your secrets separated from a hard-disk, which is a common medium for the storage of GPG secrets and could potentially represent a major security risk; b) ability to use your keys in multiple computers; c) hardware-lock preventing the secrets to be read from the token; d) it is USB, which means it is (almost) universal, dipensing the need for a Smart Card reader, while having all the benefits of a smart card; d) it is all free software-based (GPLv3), therefore it is not only transparent and widely available, but also free for further improvements and new inventive usages. After completing the tutorial, if you still have questions, access the Q&amp;amp;A forum [3] and check Riseup&#039;s tutorial [7], or just pop-up at #noisebridge on Freenode and ask us.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Check requerements for using the GPG token:&lt;br /&gt;
&lt;br /&gt;
* Your GPG keys must be RSA 2048 bits, if your keys do not met the requirement, generate new keys[4];&lt;br /&gt;
* FST-01 USB token with Gnuk pre-installed;&lt;br /&gt;
* GNU/Linux system (should work on other *nix systems, but not yet tested).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Install the following packages:&lt;br /&gt;
&lt;br /&gt;
* gnupg/gnupg2 (gnupg version &amp;gt;= 1.4 or gnupg2)&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* gnupg-pkcs11-scd (substitute for scdaemon under &#039;Squeeze&#039;)&lt;br /&gt;
* python-pyscard (to use a tool for removing keys)&lt;br /&gt;
      &lt;br /&gt;
&lt;br /&gt;
3. Edit your GPG configuration:&lt;br /&gt;
&lt;br /&gt;
Add the following content to your ~/.gnupg/gpg.conf file:&lt;br /&gt;
   &lt;br /&gt;
     use-agent&lt;br /&gt;
     personal-digest-preferences SHA256&lt;br /&gt;
     cert-digest-algo SHA256&lt;br /&gt;
     default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed&lt;br /&gt;
     default-key ADD_YOUR_KEY_ID_HERE   &lt;br /&gt;
&lt;br /&gt;
4. In order to use the token, make sure you are running gpg-agent, if not:&lt;br /&gt;
&lt;br /&gt;
Run gpg-agent:&lt;br /&gt;
     gpg-agent --daemon --enable-ssh-support&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. If you are planning to use the token to authenticate with OpenSSH&lt;br /&gt;
&lt;br /&gt;
Generate your ssh keys [5]:&lt;br /&gt;
     gpgkey2ssh TYPE_YOUR_SUBKEY_ID_HERE &amp;gt;&amp;gt; sshpubkey.txt&lt;br /&gt;
     &lt;br /&gt;
Add your pub key to the server you want to auth with your GPG token:&lt;br /&gt;
     ssh ~/.ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Personalize your token&lt;br /&gt;
&lt;br /&gt;
To change your personal info, URL where your pub key is, etc., run:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; admin&lt;br /&gt;
     Allow admin commands to be executed&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; name&lt;br /&gt;
     Register name and surname of the token owner&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; url&lt;br /&gt;
     Address for the location of your public keys, important setting to help you register the token in other machines&lt;br /&gt;
 &lt;br /&gt;
     gpg&amp;gt; passwd&lt;br /&gt;
     Set-up your PIN for the usage of the token, please this is not your &#039;passphrase&#039; for the GPG private key&lt;br /&gt;
     The default PIN from the factory is &amp;quot;123456&amp;quot;; your new PIN should not be bigger than 8 characters.&lt;br /&gt;
     It does not have to be numbers -- the acronym PIN is misleading here.&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; forcesig &lt;br /&gt;
     This will change the default setting of &#039;signature force PIN&#039; OFF&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; login&lt;br /&gt;
     Register your login name&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; help&lt;br /&gt;
     This is command is your friend, if you want to further customize the token!&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This will apply the changes&lt;br /&gt;
&lt;br /&gt;
     &lt;br /&gt;
7. Write your public and private GPG keys to the token&lt;br /&gt;
&lt;br /&gt;
Invoke GPG shell with this command, adding your key ID where indicated:&lt;br /&gt;
     gpg --edit-key TYPE_YOUR_KEY_ID_HERE&lt;br /&gt;
   &lt;br /&gt;
     gpg&amp;gt; keytocard &lt;br /&gt;
     This command will *move* your pub GPG key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; toggle&lt;br /&gt;
     This command changes from pub key to the private key operation&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; keytocard&lt;br /&gt;
     This command will move your private key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This command will save the info to the token and exit the shell&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. Using your keys in other computers with GPG installed&lt;br /&gt;
&lt;br /&gt;
Invoke the GPG shell with this command:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; fetch&lt;br /&gt;
     This command will retrieve your keys and add it to the local GPG keychain&lt;br /&gt;
     &lt;br /&gt;
The key is now registered by your local install of GPG, but you have to set the trust of it:&lt;br /&gt;
     gpg --edit-key TYPE_YOUR_KEY_ID_HERE&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; trust&lt;br /&gt;
     This command will set the key you just installed as &#039;trusted&#039;. Given it is your own key, set it to (5) &#039;ultimate&#039; trust&lt;br /&gt;
     &lt;br /&gt;
     &lt;br /&gt;
9. Before you use the token, make sure you deactivate other gpg agents. Here are some popular agents:&lt;br /&gt;
&lt;br /&gt;
* gnome-keyring (GNOME)&lt;br /&gt;
* kwallet (KDE)&lt;br /&gt;
* seahorse &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Access &#039;/etc/xdg/autostart&#039; and &#039;~/.config/autostart&#039; and add a new entry to the following config files:&lt;br /&gt;
&lt;br /&gt;
Add this line to &#039;gnome-keyring-ssh.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
   &lt;br /&gt;
Add this line to &#039;gnome-keyring-gpg.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Common Issues&lt;br /&gt;
&lt;br /&gt;
* If you get &#039;OpenPGP card not available: general error&#039;, try killing gpg-agents, such as gnome-keyring;&lt;br /&gt;
* If you type a wrong PIN three times, you will lock the device permanently, *be extra carefull*!&lt;br /&gt;
* If you need to re-write keys to the token, make sure to delete the keys on it first [6].&lt;br /&gt;
* If you remove your keys from the device, your PIN will be erased as well and reverted to the default PIN (12345678), *remember to change it!*.&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
12. Sources&lt;br /&gt;
&lt;br /&gt;
[1] http://www.seeedstudio.com/wiki/FST-01&lt;br /&gt;
&lt;br /&gt;
[2] http://www.fsij.org/doc-gnuk/&lt;br /&gt;
&lt;br /&gt;
[3] http://no-passwd.net/askbot/questions/scope:all/sort:activity-desc/page:1/&lt;br /&gt;
&lt;br /&gt;
[4] http://keyring.debian.org/creating-key.html&lt;br /&gt;
&lt;br /&gt;
[5] http://www.programmierecke.net/howto/gpg-ssh.html&lt;br /&gt;
&lt;br /&gt;
[6] http://no-passwd.net/askbot/question/51/how-to-deletereplace-the-key-in-gnuk/&lt;br /&gt;
&lt;br /&gt;
[7] https://we.riseup.net/debian/using-the-openpgp-card-with-subkeys&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30875</id>
		<title>Gnuk</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30875"/>
		<updated>2013-04-24T21:09:31Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Using Gnuk on Debian Wheezy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is a quick tutorial on how to get your public and private key to work with the Flying Stone Tiny[1] GPG token. All the information here was taken from the complete documentation of Gnuk written by its author[2]. Benefits of the Flying Stone Tiny-01 include: a) keeping your secrets separated from a hard-disk, which is a common medium for the storage of GPG secrets and could potentially represent a major security risk; b) ability to use your keys in multiple computers; c) hardware-lock preventing the secrets to be read from the token; d) it is USB, which means it is (almost) universal, dipensing the need for a Smart Card reader, while having all the benefits of a smart card; d) it is all free software-based (GPLv3), therefore it is not only transparent and widely available, but also free for further improvements and new inventive usages. After completing the tutorial, if you still have questions, access the Q&amp;amp;A forum [3] and check Riseup&#039;s tutorial [7], or just pop-up at #noisebridge on Freenode and ask us.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Check requerements for using the GPG token:&lt;br /&gt;
&lt;br /&gt;
* Your GPG keys must be RSA 2048 bits, if your keys do not met the requirement, generate new keys[4];&lt;br /&gt;
* FST-01 USB token with Gnuk pre-installed;&lt;br /&gt;
* GNU/Linux system (should work on other *nix systems, but not yet tested).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Install the following packages:&lt;br /&gt;
&lt;br /&gt;
* gnupg/gnupg2 (gnupg version &amp;gt;= 1.4 or gnupg2)&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* gnupg-pkcs11-scd (substitute for scdaemon under &#039;Squeeze&#039;)&lt;br /&gt;
* python-pyscard (to use a tool for removing keys)&lt;br /&gt;
      &lt;br /&gt;
&lt;br /&gt;
3. Edit your GPG configuration:&lt;br /&gt;
&lt;br /&gt;
Add the following content to your ~/.gnupg/gpg.conf file:&lt;br /&gt;
   &lt;br /&gt;
     use-agent&lt;br /&gt;
     personal-digest-preferences SHA256&lt;br /&gt;
     cert-digest-algo SHA256&lt;br /&gt;
     default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed&lt;br /&gt;
     default-key ADD_YOUR_KEY_ID_HERE   &lt;br /&gt;
&lt;br /&gt;
4. In order to use the token, make sure you are running gpg-agent, if not:&lt;br /&gt;
&lt;br /&gt;
Run gpg-agent:&lt;br /&gt;
     gpg-agent --daemon --enable-ssh-support&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. If you are planning to use the token to authenticate with OpenSSH&lt;br /&gt;
&lt;br /&gt;
Generate your ssh keys [5]:&lt;br /&gt;
     gpgkey2ssh ADD_YOUR_SUBKEY_ID_HERE &amp;gt;&amp;gt; sshpubkey.txt&lt;br /&gt;
     &lt;br /&gt;
Add your pub key to the server you want to auth with your GPG token:&lt;br /&gt;
     ssh ~/.ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Personalize your token&lt;br /&gt;
&lt;br /&gt;
To change your personal info, URL where your pub key is, etc., run:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; admin&lt;br /&gt;
     Allow admin commands to be executed&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; name&lt;br /&gt;
     Register name and surname of the token owner&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; url&lt;br /&gt;
     Address for the location of your public keys, important setting to help you register the token in other machines&lt;br /&gt;
 &lt;br /&gt;
     gpg&amp;gt; passwd&lt;br /&gt;
     Set-up your PIN for the usage of the token, please this is not your &#039;passphrase&#039; for the GPG private key&lt;br /&gt;
     The default PIN from the factory is &amp;quot;123456&amp;quot;; your new PIN should not be bigger than 8 characters.&lt;br /&gt;
     It does not have to be numbers -- the acronym PIN is misleading here.&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; forcesig &lt;br /&gt;
     This will change the default setting of &#039;signature force PIN&#039; OFF&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; login&lt;br /&gt;
     Register your login name&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; help&lt;br /&gt;
     This is command is your friend, if you want to further customize the token!&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This will apply the changes&lt;br /&gt;
&lt;br /&gt;
     &lt;br /&gt;
7. Write your public and private GPG keys to the token&lt;br /&gt;
&lt;br /&gt;
Invoke GPG shell with this command, adding your key ID where indicated:&lt;br /&gt;
     gpg --edit-key ADD_YOUR_KEY_ID_HERE&lt;br /&gt;
   &lt;br /&gt;
     gpg&amp;gt; keytocard &lt;br /&gt;
     This command will *move* your pub GPG key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; toggle&lt;br /&gt;
     This command changes from pub key to the private key operation&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; keytocard&lt;br /&gt;
     This command will move your private key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This command will save the info to the token and exit the shell&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. Using your keys in other computers with GPG installed&lt;br /&gt;
&lt;br /&gt;
Invoke the GPG shell with this command:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; fetch&lt;br /&gt;
     This command will retrieve your keys and add it to the local GPG keychain&lt;br /&gt;
     &lt;br /&gt;
The key is now registered by your local install of GPG, but you have to set the trust of it:&lt;br /&gt;
     gpg --edit-key ADD_YOUR_KEY_ID_HERE&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; trust&lt;br /&gt;
     This command will set the key you just installed as &#039;trusted&#039;. Given it is your own key, set it to (5) &#039;ultimate&#039; trust&lt;br /&gt;
     &lt;br /&gt;
     &lt;br /&gt;
9. Before you use the token, make sure you deactivate other gpg agents. Here are some popular agents:&lt;br /&gt;
&lt;br /&gt;
* gnome-keyring (GNOME)&lt;br /&gt;
* kwallet (KDE)&lt;br /&gt;
* seahorse &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Access &#039;/etc/xdg/autostart&#039; and &#039;~/.config/autostart&#039; and add a new entry to the following config files:&lt;br /&gt;
&lt;br /&gt;
Add this line to &#039;gnome-keyring-ssh.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
   &lt;br /&gt;
Add this line to &#039;gnome-keyring-gpg.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Common Issues&lt;br /&gt;
&lt;br /&gt;
* If you get the &#039;OpenPGP card not available: general error&#039;, try killing gpg-agents, such as gnome-keyring;&lt;br /&gt;
* If you type a wrong PIN three times, you will lock the device permanently, *be extra carefull*!&lt;br /&gt;
* If you need to re-write keys to the token, make sure to delete the keys on it first [6].&lt;br /&gt;
* If you remove your keys from the device, your PIN will be erased as well and reverted to the default PIN (12345678), *remember to change it*.&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
12. Sources&lt;br /&gt;
&lt;br /&gt;
[1] http://www.seeedstudio.com/wiki/FST-01&lt;br /&gt;
&lt;br /&gt;
[2] http://www.fsij.org/doc-gnuk/&lt;br /&gt;
&lt;br /&gt;
[3] http://no-passwd.net/askbot/questions/scope:all/sort:activity-desc/page:1/&lt;br /&gt;
&lt;br /&gt;
[4] http://keyring.debian.org/creating-key.html&lt;br /&gt;
&lt;br /&gt;
[5] http://www.programmierecke.net/howto/gpg-ssh.html&lt;br /&gt;
&lt;br /&gt;
[6] http://no-passwd.net/askbot/question/51/how-to-deletereplace-the-key-in-gnuk/&lt;br /&gt;
&lt;br /&gt;
[7] https://we.riseup.net/debian/using-the-openpgp-card-with-subkeys&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30874</id>
		<title>Gnuk</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Gnuk&amp;diff=30874"/>
		<updated>2013-04-24T21:06:31Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Using Gnuk on Debian Wheezy&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is a quick tutorial on how to get your public and private key to work with the Flying Stone Tiny[1] GPG token. All the information here was taken from the complete documentation of Gnuk written by its author[2]. Benefits of the Flying Stone Tiny-01 include: a) keeping your secrets separated from a hard-disk, which is a common medium for the storage of GPG secrets and could potentially represent a major security risk; b) ability to use your keys in multiple computers; c) hardware-lock preventing the secrets to be read from the token; d) it is USB, which means it is (almost) universal, dipensing the need for a Smart Card reader, while having all the benefits of a smart card; d) it is all free software-based (GPLv3), therefore it is not only transparent and widely available, but also free for further improvements and new inventive usages. After completing the tutorial, if you still have questions, access the Q&amp;amp;A forum [3] and check Riseup&#039;s tutorial [7].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Check requerements for using the GPG token:&lt;br /&gt;
&lt;br /&gt;
   - Your GPG keys must be RSA 2048 bits, if your keys do not met the requirement, generate new keys[4];&lt;br /&gt;
   - FST-01 USB token with Gnuk pre-installed (click here for alternatives);&lt;br /&gt;
   - GNU/Linux system (should work on other *nix systems, but not yet tested).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Install the following packages:&lt;br /&gt;
&lt;br /&gt;
   - gnupg/gnupg2 (gnupg version &amp;gt;= 1.4 or gnupg2)&lt;br /&gt;
   - gpg-agent&lt;br /&gt;
   - gnupg-pkcs11-scd (substitute for scdaemon under &#039;Squeeze&#039;)&lt;br /&gt;
   - python-pyscard (to use a tool for removing keys)&lt;br /&gt;
      &lt;br /&gt;
&lt;br /&gt;
3. Edit your GPG configuration:&lt;br /&gt;
&lt;br /&gt;
Add the following content to your ~/.gnupg/gpg.conf file:&lt;br /&gt;
   &lt;br /&gt;
     use-agent&lt;br /&gt;
     personal-digest-preferences SHA256&lt;br /&gt;
     cert-digest-algo SHA256&lt;br /&gt;
     default-preference-list SHA512 SHA384 SHA256 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed&lt;br /&gt;
     default-key ADD_YOUR_KEY_ID_HERE   &lt;br /&gt;
&lt;br /&gt;
4. In order to use the token, make sure you are running gpg-agent, if not:&lt;br /&gt;
&lt;br /&gt;
Run gpg-agent:&lt;br /&gt;
     gpg-agent --daemon --enable-ssh-support&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. If you are planning to use the token to authenticate with OpenSSH&lt;br /&gt;
&lt;br /&gt;
Generate your ssh keys [5]:&lt;br /&gt;
     gpgkey2ssh ADD_YOUR_SUBKEY_ID_HERE &amp;gt;&amp;gt; sshpubkey.txt&lt;br /&gt;
     &lt;br /&gt;
Add your pub key to the server you want to auth with your GPG token:&lt;br /&gt;
     ssh ~/.ssh/authorized_keys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Personalize your token&lt;br /&gt;
&lt;br /&gt;
To change your personal info, URL where your pub key is, etc., run:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; admin&lt;br /&gt;
     Allow admin commands to be executed&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; name&lt;br /&gt;
     Register name and surname of the token owner&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; url&lt;br /&gt;
     Address for the location of your public keys, important setting to help you register the token in other machines&lt;br /&gt;
 &lt;br /&gt;
     gpg&amp;gt; passwd&lt;br /&gt;
     Set-up your PIN for the usage of the token, please this is not your &#039;passphrase&#039; for the GPG private key&lt;br /&gt;
     The default PIN from the factory is &amp;quot;123456&amp;quot;; your new PIN should not be bigger than 8 characters.&lt;br /&gt;
     It does not have to be numbers -- the acronym PIN is misleading here.&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; forcesig &lt;br /&gt;
     This will change the default setting of &#039;signature force PIN&#039; OFF&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; login&lt;br /&gt;
     Register your login name&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; help&lt;br /&gt;
     This is command is your friend, if you want to further customize the token!&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This will apply the changes&lt;br /&gt;
&lt;br /&gt;
     &lt;br /&gt;
7. Write your public and private GPG keys to the token&lt;br /&gt;
&lt;br /&gt;
Invoke GPG shell with this command, adding your key ID where indicated:&lt;br /&gt;
     gpg --edit-key ADD_YOUR_KEY_ID_HERE&lt;br /&gt;
   &lt;br /&gt;
     gpg&amp;gt; keytocard &lt;br /&gt;
     This command will *move* your pub GPG key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; toggle&lt;br /&gt;
     This command changes from pub key to the private key operation&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; keytocard&lt;br /&gt;
     This command will move your private key to the token&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; save&lt;br /&gt;
     This command will save the info to the token and exit the shell&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. Using your keys in other computers with GPG installed&lt;br /&gt;
&lt;br /&gt;
Invoke the GPG shell with this command:&lt;br /&gt;
     gpg --card-edit&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; fetch&lt;br /&gt;
     This command will retrieve your keys and add it to the local GPG keychain&lt;br /&gt;
     &lt;br /&gt;
The key is now registered by your local install of GPG, but you have to set the trust of it:&lt;br /&gt;
     gpg --edit-key ADD_YOUR_KEY_ID_HERE&lt;br /&gt;
     &lt;br /&gt;
     gpg&amp;gt; trust&lt;br /&gt;
     This command will set the key you just installed as &#039;trusted&#039;. Given it is your own key, set it to (5) &#039;ultimate&#039; trust&lt;br /&gt;
     &lt;br /&gt;
     &lt;br /&gt;
9. Before you use the token, make sure you deactivate other gpg agents. Here are some popular agents:&lt;br /&gt;
&lt;br /&gt;
   - gnome-keyring (GNOME)&lt;br /&gt;
   - kwallet (KDE)&lt;br /&gt;
   - seahorse &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10. Access &#039;/etc/xdg/autostart&#039; and &#039;~/.config/autostart&#039; and add a new entry to the following config files:&lt;br /&gt;
&lt;br /&gt;
Add this line to &#039;gnome-keyring-ssh.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
   &lt;br /&gt;
Add this line to &#039;gnome-keyring-gpg.desktop&#039;:&lt;br /&gt;
     X-GNOME-Autostart-enabled=false&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11. Common Issues&lt;br /&gt;
&lt;br /&gt;
   * If you get the &#039;OpenPGP card not available: general error&#039;, try killing gpg-agents, such as gnome-keyring;&lt;br /&gt;
   * If you type a wrong PIN three times, you will lock the device permanently, *be extra carefull*!&lt;br /&gt;
   * If you need to re-write keys to the token, make sure to delete the keys on it first [6].&lt;br /&gt;
   * If you remove your keys from the device, your PIN will be erased as well and reverted to the default PIN (12345678), *remember to change it*.&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
12. Sources&lt;br /&gt;
&lt;br /&gt;
[1] http://www.seeedstudio.com/wiki/FST-01&lt;br /&gt;
&lt;br /&gt;
[2] http://www.fsij.org/doc-gnuk/&lt;br /&gt;
&lt;br /&gt;
[3] http://no-passwd.net/askbot/questions/scope:all/sort:activity-desc/page:1/&lt;br /&gt;
&lt;br /&gt;
[4] http://keyring.debian.org/creating-key.html&lt;br /&gt;
&lt;br /&gt;
[5] http://www.programmierecke.net/howto/gpg-ssh.html&lt;br /&gt;
&lt;br /&gt;
[6] http://no-passwd.net/askbot/question/51/how-to-deletereplace-the-key-in-gnuk/&lt;br /&gt;
&lt;br /&gt;
[7] https://we.riseup.net/debian/using-the-openpgp-card-with-subkeys&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=User:Unixjazz&amp;diff=30019</id>
		<title>User:Unixjazz</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=User:Unixjazz&amp;diff=30019"/>
		<updated>2013-03-22T23:41:12Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: /* on-going projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hi there! &amp;lt;br&amp;gt;&lt;br /&gt;
This is [http://tux.gseis.ucla.edu/ me]&lt;br /&gt;
&lt;br /&gt;
== on-going projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://noisebridge.net/wiki/Bookclub Bookclub]&lt;br /&gt;
* Raspbarricade: Portable Live Audio Streamer&lt;br /&gt;
* VP8+Webm streaming&lt;br /&gt;
* Hacking + Free and Open Source research&lt;br /&gt;
&lt;br /&gt;
== tutorials ==&lt;br /&gt;
&lt;br /&gt;
* Gnuk - GPG crypto USB token&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=User:Unixjazz&amp;diff=30018</id>
		<title>User:Unixjazz</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=User:Unixjazz&amp;diff=30018"/>
		<updated>2013-03-22T23:39:45Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hi there! &amp;lt;br&amp;gt;&lt;br /&gt;
This is [http://tux.gseis.ucla.edu/ me]&lt;br /&gt;
&lt;br /&gt;
== on-going projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://noisebridge.net/wiki/Bookclub Bookclub]&lt;br /&gt;
* raspbarricade -- portable live audio streamer&lt;br /&gt;
* vp8+webm streaming&lt;br /&gt;
&lt;br /&gt;
== tutorials ==&lt;br /&gt;
&lt;br /&gt;
* Gnuk - GPG crypto USB token&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Bookclub&amp;diff=29864</id>
		<title>Bookclub</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Bookclub&amp;diff=29864"/>
		<updated>2013-03-13T23:02:05Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We compile here is a list of books on technology, culture, and politics. &lt;br /&gt;
&lt;br /&gt;
Obsessively compiled list of books by Miah is on [http://www.goodreads.com/group/show/41745.Noisebridge_Book_Club Goodreads].&lt;br /&gt;
&lt;br /&gt;
Noisebridge library can be found here: [http://www.librarything.com/profile/noisebridge LibraryThing]&lt;br /&gt;
&amp;lt;br&amp;gt;(at least, 1/3 of the books are listed here)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technology and Culture ==&lt;br /&gt;
&lt;br /&gt;
Abbate, Janet. 1999. Inventing the Internet. Cambridge  Mass: MIT Press.&lt;br /&gt;
&lt;br /&gt;
Benkler, Yochai. 2011. The Penguin and the Leviathan: How Cooperation Triumphs over Self-Interest. Random House Digital, Inc.&lt;br /&gt;
&lt;br /&gt;
Beyer, Kurt. 2009. Grace Hopper and the Invention of the Information Age. Cambridge  Mass.: MIT Press.&lt;br /&gt;
&lt;br /&gt;
Coleman, Gabriella. 2012. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press.&lt;br /&gt;
&lt;br /&gt;
Ellul, Jacques. 1964. The Technological Society. Jonathan Cape.&lt;br /&gt;
&lt;br /&gt;
Galloway, Alexander R. 2004. Protocol: How Control Exists After Decentralization. MIT Press.&lt;br /&gt;
&lt;br /&gt;
Kelty, Christopher. 2008. Two Bits : the Cultural Significance of Free Software. Durham: Duke University Press.&lt;br /&gt;
&lt;br /&gt;
Levy, Steven. 2001. Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age. Penguin.&lt;br /&gt;
&lt;br /&gt;
Montfort, Nick, and Ian Bogost. 2009. Racing the Beam: The Atari Video Computer System. MIT Press.&lt;br /&gt;
&lt;br /&gt;
Pasquinelli, Matteo. 2008. Animal Spirits: a Bestiary of the Commons. NAi Publishers.&lt;br /&gt;
&lt;br /&gt;
Reagle, Joseph. 2010. Good Faith Collaboration : the Culture of Wikipedia. Cambridge  Mass.: MIT Press.&lt;br /&gt;
&lt;br /&gt;
Salus, Peter. 1994. A Quarter Century of UNIX. Reading  Mass.: Addison-Wesley Pub. Co.&lt;br /&gt;
&lt;br /&gt;
Thomas, Douglas. 2002. Hacker Culture. Minneapolis: University of Minnesota Press.&lt;br /&gt;
&lt;br /&gt;
Turner, Fred. 2006. From Counterculture to Cyberculture : Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. Chicago: University of Chicago Press.&lt;br /&gt;
&lt;br /&gt;
Weber, Steve. 2004. The Success of Open Source. Cambridge  MA: Harvard University Press.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Anarchism ==&lt;br /&gt;
&lt;br /&gt;
Bakunin, Mikhail Alexandrovich. 2009. God and the State. Cosimo, Inc.&lt;br /&gt;
&lt;br /&gt;
Bey, Hakim. 2003. T.A.Z. Autonomedia.&lt;br /&gt;
&lt;br /&gt;
Berkman, Alexander. 2011. Life of an Anarchist: The Alexander Berkman Reader. Seven Stories Press.&lt;br /&gt;
&lt;br /&gt;
Bookchin, Murray. 2007. Social Ecology and Communalism. AK Press.&lt;br /&gt;
&lt;br /&gt;
Pateman, Barry. 2010. Chomsky on Anarchism. AK Press. &lt;br /&gt;
&lt;br /&gt;
Guérin, Daniel. 1970. Anarchism; from Theory to Practice. Monthly Review Press.&lt;br /&gt;
&lt;br /&gt;
———. 2005. No Gods, No Masters. AK Press.&lt;br /&gt;
&lt;br /&gt;
Graeber, David. 2009. Direct Action: An Ethnography. AK Press.&lt;br /&gt;
&lt;br /&gt;
Illich, Ivan. 1983. Deschooling Society. Harper &amp;amp; Row.&lt;br /&gt;
&lt;br /&gt;
Kropotkin, Petr Alekseevich. 1910. Mutual Aid: A Factor of Evolution. William Heinemann.&lt;br /&gt;
&lt;br /&gt;
Lafargue, Paul. 1907. The Right to Be Lazy: And Other Studies. C. H. Kerr &amp;amp; company.&lt;br /&gt;
&lt;br /&gt;
Magón, Ricardo Flores, and Charles Bufe. 2005. Dreams of Freedom: A Ricardo Flores Magón Reader. AK Press.&lt;br /&gt;
&lt;br /&gt;
M, P. 2011. Bolo’Bolo. Autonomedia.&lt;br /&gt;
&lt;br /&gt;
Proudhon, Pierre-Joseph. 2011. Property Is Theft!: A Pierre-Joseph Proudhon Reader. AK Press.&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
	<entry>
		<id>https://wiki.extremist.software/index.php?title=Aaron_Swartz_Memorial_Hackathon&amp;diff=29009</id>
		<title>Aaron Swartz Memorial Hackathon</title>
		<link rel="alternate" type="text/html" href="https://wiki.extremist.software/index.php?title=Aaron_Swartz_Memorial_Hackathon&amp;diff=29009"/>
		<updated>2013-01-25T01:30:07Z</updated>

		<summary type="html">&lt;p&gt;108.85.224.67: /* Who&amp;#039;s going? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In memory of [http://en.wikipedia.org/wiki/Aaron_Swartz Aaron Swartz], and in coordination with a [[Worldwide Aaron Swartz Memorial Hackathons|world-wide effort]], Noisebridge will be hosting a hackathon starting &#039;&#039;&#039;Friday, January 25th&#039;&#039;&#039;, and continuing through &#039;&#039;&#039;Sunday, January 27th&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
== Intro ==&lt;br /&gt;
&lt;br /&gt;
Aaron was a hacktivist and friend of many in our community. He helped create RSS 1.0; contributed to Creative Commons; was an early builder of Reddit, where he&#039;s often acknowledged as a co-founder; created the [http://webpy.org/ web.py] framework; and more recently, became a data liberator, first with PACER and then with scholarly articles from JSTOR, both of which got him into trouble with the law.&lt;br /&gt;
&lt;br /&gt;
Aaron&#039;s [http://demandprogress.org/ Demand Progress] project helped stop SOPA, the Stop Online Piracy Act in the US, which threatened to have far reaching unintended consequences. &lt;br /&gt;
&lt;br /&gt;
Aaron Swartz committed suicide on Jan. 11, 2013, but his work on making the world a better place should not die with him. Join us for two days of understanding his work and contributing to keep his memory and projects alive.&lt;br /&gt;
&lt;br /&gt;
(This section adapted with permission from the [http://hacknight.in/hasgeek/aaronsw-memorial Bangalore hackathon].)&lt;br /&gt;
&lt;br /&gt;
== Event Details ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;When&#039;&#039;&#039;: 7pm Jan. 25 - 7pm Jan. 27&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What&#039;&#039;&#039;: Come learn new skills and work together on projects that Aaron would have liked. Themes include open information access, sharing and preserving human knowledge, hacking for social/political justice, and techno-activism. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Organizers&#039;&#039;&#039;: [[user:yan | yan]], [[user:Turkshead | shannon]], [[user:Mct| mct]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remote collab&#039;&#039;&#039;: [https://groups.google.com/group/science-liberation-front mailing list]&lt;br /&gt;
&lt;br /&gt;
The event is free, but we&#039;ll have donation boxes for purchasing food and project supplies. BYO-snacks-and-energy-drinks.&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
There are a bunch of project ideas [https://docs.google.com/spreadsheet/ccc?key=0Ai2JAMm86EJbdFg1TW5tenNJSUt3X2dVVmQ3M08xSlE#gid=1 here]. Most of them need someone to volunteer to be the point of contact.&lt;br /&gt;
&lt;br /&gt;
== Schedule ==&lt;br /&gt;
&lt;br /&gt;
Talks are relatively informal. &lt;br /&gt;
&lt;br /&gt;
Scheduled talks/demos (tentative): &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Friday&#039;&#039;&#039;&lt;br /&gt;
*7 pm: Hackathon starts, Yan probably says some words and asks for money&lt;br /&gt;
*8 pm: Keynote talk on Aaron&#039;s life and work by [https://en.wikipedia.org/wiki/Danny_O&#039;Brien Danny O&#039;Brien]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
*4 pm: &#039;&#039;Data hacking: Machine learning + NLP&#039;&#039;, [https://twitter.com/turian Joseph Turian]. I will answer questions about machine learning, NLP, scraping, data hacking etc.&lt;br /&gt;
*5 pm: &#039;&#039;Hacktivism: On social justice movements&#039;&#039;, [http://www.linkedin.com/in/djabbour Daniel Jabbour]. A brief history of social justice movements, and my own experience with policy reform and hacktivism.&lt;br /&gt;
*6 pm: &#039;&#039;Principles of Low Power Design&#039;&#039;, [http://dolemite.wuli.nu/ Alex Newman]. Hardware you have never heard of for more low power. &lt;br /&gt;
*7 pm: &#039;&#039;Improving the Scientific Process through Software&#039;&#039;, [http://www.hertzfoundation.org/dx/fellows/fellow_profile.aspx?d=1205 Jacob Steinhardt]. Learn about existing open source projects to improve science, and others that should exist but don&#039;t.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Sunday&#039;&#039;&#039;&lt;br /&gt;
*4 pm: &#039;&#039;Towards Open Access in the Sciences&#039;&#039;, [https://web.mit.edu/open Yan Zhu]. Why open journal access is important for scientific progress and what we can do to facilitate it.&lt;br /&gt;
*5 pm: Closing remarks by Danny O&#039;Brien&lt;br /&gt;
*5:15 pm - end: Project demos! Show us what you&#039;ve worked on this weekend.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Unscheduled / Unconfirmed Events&#039;&#039;&#039;&lt;br /&gt;
*DJ set by [http://www.chromatest.net/ Chromatest J. Pantsmaker]&lt;br /&gt;
*Workshop on how to write letters for FOIA requests&lt;br /&gt;
*DIY Book Scanner workshop&lt;br /&gt;
*Field trip to look for hidden cameras in public places around the Mission&lt;br /&gt;
&lt;br /&gt;
If you&#039;d like to give a talk/workshop, add it to https://docs.google.com/spreadsheet/ccc?key=0Ai2JAMm86EJbdFg1TW5tenNJSUt3X2dVVmQ3M08xSlE#gid=2.&lt;br /&gt;
&lt;br /&gt;
== Who&#039;s going? ==&lt;br /&gt;
&lt;br /&gt;
(There&#039;s also a [https://www.facebook.com/events/119075571602113/ Facebook Event], if you are so inclined.  Sadly, a Facebook login is required to access that page.)&lt;br /&gt;
&lt;br /&gt;
[[user:yan | yan]]&lt;br /&gt;
&lt;br /&gt;
[[user:Turkshead | shannon]]&lt;br /&gt;
&lt;br /&gt;
[[user:Mct| mct]]&lt;br /&gt;
&lt;br /&gt;
[[user:Davidme | davidme]]&lt;br /&gt;
&lt;br /&gt;
[[user:judytuna | judytuna]]&lt;br /&gt;
&lt;br /&gt;
[[user:Lizzard | Liz]]&lt;br /&gt;
&lt;br /&gt;
[[user:zestyping | Ping]]&lt;br /&gt;
&lt;br /&gt;
[[user:gardner | gardner!!]]&lt;br /&gt;
&lt;br /&gt;
[[user:unixjazz | felipe]]&lt;/div&gt;</summary>
		<author><name>108.85.224.67</name></author>
	</entry>
</feed>