website/gpg-key.md

36 lines
1.2 KiB
Markdown
Raw Normal View History

2023-08-03 19:31:43 -04:00
---
title: GPG Key
2023-08-08 19:04:54 -04:00
description: Information about my GPG public key and how to obtain it.
2023-08-03 19:31:43 -04:00
---
2024-03-05 18:38:42 -05:00
> I do not use keyservers. A key claiming to be mine from a keyserver is
> definitely a fake. {.warning}
2023-08-03 19:31:43 -04:00
2024-03-05 18:38:42 -05:00
> I suggest reading up on GPG if you are unfamiliar with it. You can find
> information about GPG on the [GnuPG official website](https://gnupg.org/).
> {.info}
2023-08-03 19:31:43 -04:00
2023-08-08 19:01:17 -04:00
## Obtaining My Key
2023-08-03 19:31:43 -04:00
2024-03-05 18:38:42 -05:00
You can download my public key here:
[Foster Hangdaan's Public Key](https://static.fosterhangdaan.com/foster-pubkey.asc){download}.
2023-08-03 19:31:43 -04:00
The key's fingerprint should match the one below:
2023-08-03 19:31:43 -04:00
2024-03-05 18:38:42 -05:00
```txt
2023-08-03 19:31:43 -04:00
pub ed25519/E48D7F49A852F112 2023-07-14 [SC]
2023-10-09 10:27:17 -04:00
Key fingerprint = DBD3 8E38 4B9E 1F4F 19F9 5BAE E48D 7F49 A852 F112
2023-08-03 19:31:43 -04:00
uid Foster Hangdaan <foster@hangdaan.email>
```
2023-08-08 19:01:17 -04:00
## Utilizing My Key
2024-03-05 18:38:42 -05:00
Once you have imported my public key, you can use it to verify software and
binaries released by me.
2023-08-08 19:01:17 -04:00
2024-03-05 18:38:42 -05:00
You can also use my public key to encrypt emails you send to me. In that case, I
would also need your public key so I can encrypt the emails I send back to you.
The excellent
[Email Self-Defense Guide by the Free Software Foundation](https://emailselfdefense.fsf.org/)
describes how this process works.