website/gpg-key.md

30 lines
1.2 KiB
Markdown
Raw Normal View History

2023-08-03 19:31:43 -04:00
---
title: GPG Key
2023-08-08 19:04:54 -04:00
description: Information about my GPG public key and how to obtain it.
2023-08-03 19:31:43 -04:00
---
2023-08-10 23:14:45 -04:00
> I do not use keyservers. A key claiming to be mine from a keyserver is definitely a fake.
2023-08-08 19:01:17 -04:00
{.warning}
2023-08-03 19:31:43 -04:00
2023-08-10 23:14:45 -04:00
> I suggest reading up on GPG if you are unfamiliar with it.
> You can find information about GPG on the [GnuPG official website](https://gnupg.org/).
2023-08-08 19:01:17 -04:00
{.info}
2023-08-03 19:31:43 -04:00
2023-08-08 19:01:17 -04:00
## Obtaining My Key
2023-08-03 19:31:43 -04:00
You can download my public key here: [Foster Hangdaan's Public Key](https://static.fosterhangdaan.com/foster-pubkey.asc){download}.
2023-08-03 19:31:43 -04:00
The key's fingerprint should match the one below:
2023-08-03 19:31:43 -04:00
``` txt
2023-08-03 19:31:43 -04:00
pub ed25519/E48D7F49A852F112 2023-07-14 [SC]
2023-10-09 10:27:17 -04:00
Key fingerprint = DBD3 8E38 4B9E 1F4F 19F9 5BAE E48D 7F49 A852 F112
2023-08-03 19:31:43 -04:00
uid Foster Hangdaan <foster@hangdaan.email>
```
2023-08-08 19:01:17 -04:00
## Utilizing My Key
2023-08-10 23:14:45 -04:00
Once you have imported my public key, you can use it to verify software and binaries released by me.
2023-08-08 19:01:17 -04:00
You can also use my public key to encrypt emails you send to me. In that case, I would also need your public key so I can encrypt the emails I send back to you. The excellent [Email Self-Defense Guide by the Free Software Foundation](https://emailselfdefense.fsf.org/) describes how this process works.