website/gpg-key.md

30 lines
1.2 KiB
Markdown
Raw Normal View History

2023-08-03 19:31:43 -04:00
---
title: GPG Key
description: Information about my public GPG key and how to obtain it.
---
2023-08-08 19:01:17 -04:00
> I do not use keyservers. A key claiming to be mine on a keyserver is definitely a fake.
{.warning}
2023-08-03 19:31:43 -04:00
2023-08-08 19:01:17 -04:00
> Before proceeding, I suggest reading up on GPG if you are unfamiliar with it.
> You can find more information about GPG on the [GnuPG official website](https://gnupg.org/){target="_blank"}.
{.info}
2023-08-03 19:31:43 -04:00
2023-08-08 19:01:17 -04:00
## Obtaining My Key
2023-08-03 19:31:43 -04:00
You can download my public key here: [Foster Hangdaan's Public Key](https://static.fosterhangdaan.com/foster-pubkey.asc){target="_blank"}{download}.
2023-08-03 19:31:43 -04:00
The key's fingerprint should match the one below:
2023-08-03 19:31:43 -04:00
```
pub ed25519/E48D7F49A852F112 2023-07-14 [SC]
Key fingerprint = DBD3 8E38 4B9E 1F4F 19F9 5BAE E48D 7F49 A852 F112
uid Foster Hangdaan <foster@hangdaan.email>
```
2023-08-08 19:01:17 -04:00
## Utilizing My Key
Once you've downloaded and imported my public key, you can use it to verify software and binaries released by me.
You can also use the key to encrypt emails you send to me. In that case, I would also need your public key so I can encrypt the emails I send back to you. The excellent [Email Self-Defense Guide by the Free Software Foundation](https://emailselfdefense.fsf.org/){target="_blank"} describes how this process works.