2023-08-03 19:31:43 -04:00
---
title: GPG Key
2023-08-08 19:04:54 -04:00
description: Information about my GPG public key and how to obtain it.
2023-08-03 19:31:43 -04:00
---
2023-08-10 23:14:45 -04:00
> I do not use keyservers. A key claiming to be mine from a keyserver is definitely a fake.
2023-08-08 19:01:17 -04:00
{.warning}
2023-08-03 19:31:43 -04:00
2023-08-10 23:14:45 -04:00
> I suggest reading up on GPG if you are unfamiliar with it.
2023-09-15 16:28:02 -04:00
> You can find information about GPG on the [GnuPG official website](https://gnupg.org/).
2023-08-08 19:01:17 -04:00
{.info}
2023-08-03 19:31:43 -04:00
2023-08-08 19:01:17 -04:00
## Obtaining My Key
2023-08-03 19:31:43 -04:00
2023-09-15 16:28:02 -04:00
You can download my public key here: [Foster Hangdaan's Public Key ](https://static.fosterhangdaan.com/foster-pubkey.asc ){download}.
2023-08-03 19:31:43 -04:00
2023-08-04 21:15:18 -04:00
The key's fingerprint should match the one below:
2023-08-03 19:31:43 -04:00
```
pub ed25519/E48D7F49A852F112 2023-07-14 [SC]
2023-10-09 10:27:17 -04:00
Key fingerprint = DBD3 8E38 4B9E 1F4F 19F9 5BAE E48D 7F49 A852 F112
2023-08-03 19:31:43 -04:00
uid Foster Hangdaan < foster @ hangdaan . email >
```
2023-08-08 19:01:17 -04:00
## Utilizing My Key
2023-08-10 23:14:45 -04:00
Once you have imported my public key, you can use it to verify software and binaries released by me.
2023-08-08 19:01:17 -04:00
2023-09-15 16:28:02 -04:00
You can also use my public key to encrypt emails you send to me. In that case, I would also need your public key so I can encrypt the emails I send back to you. The excellent [Email Self-Defense Guide by the Free Software Foundation ](https://emailselfdefense.fsf.org/ ) describes how this process works.