Why ProtonDrive uses so many layers of encryption that looks redundant

I read their security model which explains how they laid out all these layers. https://proton.me/blog/protondrive-security
Files and folders are structured in a tree and called nodes. Each node (file/folder) have a password and asymmetric … Continue reading Why ProtonDrive uses so many layers of encryption that looks redundant

GPG: importing a friend’s signature on my public key demotes "ultimate" to "full"

This may be a newbie question. A friend ("Bob") and I have tried to sign each others’ keys according to these instructions. I want to get Bob’s signature on my public key into my own keychain. We get to step 6, where Bob has sent… Continue reading GPG: importing a friend’s signature on my public key demotes "ultimate" to "full"

How can I "update" a pgp public key on a keyserver with a new signature for one of the user id

I have created a pgp keypair and uploaded the public key to keys.openpgp.org.
It included my email address.
A government service has now verified my citizen ID and signed my pgp public key user id (proof that the name on my ID matches with… Continue reading How can I "update" a pgp public key on a keyserver with a new signature for one of the user id

Why do phishing attackers not alter the reference image along with the PGP signature and other content?

I don´t really understand the tech behind that. I don´t understand how the image is not changed by the ones who want to steal from you but the rest of the pgp signature match the phishing site.
The image is from a darknet market and all of… Continue reading Why do phishing attackers not alter the reference image along with the PGP signature and other content?