Update GPG Key page
This commit is contained in:
parent
d70e2ae980
commit
b38f36b3c5
1 changed files with 12 additions and 12 deletions
24
gpg-key.md
24
gpg-key.md
|
@ -3,20 +3,14 @@
|
|||
description: Information about my public GPG key and how to obtain it.
|
||||
---
|
||||
|
||||
> I do not use keyservers. This is the only place where I provide my public key. A key claiming to be mine somewhere else is definitely a fake.
|
||||
> I do not use keyservers. A key claiming to be mine on a keyserver is definitely a fake.
|
||||
{.warning}
|
||||
|
||||
> Before proceeding, I suggest reading up on GPG if you are unfamiliar with it.
|
||||
> You can find more information about GPG on the [GnuPG official website](https://gnupg.org/){target="_blank"}.
|
||||
{.info}
|
||||
|
||||
## Intro
|
||||
|
||||
Before proceeding, I suggest reading up on GPG if you are unfamiliar with it.
|
||||
You can find more information about GPG on the [GnuPG official website](https://gnupg.org/){target="_blank"}.
|
||||
|
||||
You can utilize the public key here to verify software and binaries released by me.
|
||||
|
||||
You can also use the key to encrypt emails you send to me. In that case, I would also need your public key so I can encrypt the emails I send back to you.
|
||||
The excellent [Email Self-Defense Guide by the Free Software Foundation](https://emailselfdefense.fsf.org/){target="_blank"} describes how this process works.
|
||||
|
||||
## Obtaining my key
|
||||
## Obtaining My Key
|
||||
|
||||
You can download my public key here: [Foster Hangdaan's Public Key](https://static.fosterhangdaan.com/foster-pubkey.asc){target="_blank"}{download}.
|
||||
|
||||
|
@ -27,3 +21,9 @@ ## Obtaining my key
|
|||
Key fingerprint = DBD3 8E38 4B9E 1F4F 19F9 5BAE E48D 7F49 A852 F112
|
||||
uid Foster Hangdaan <foster@hangdaan.email>
|
||||
```
|
||||
|
||||
## Utilizing My Key
|
||||
|
||||
Once you've downloaded and imported my public key, you can use it to verify software and binaries released by me.
|
||||
|
||||
You can also use the key to encrypt emails you send to me. In that case, I would also need your public key so I can encrypt the emails I send back to you. The excellent [Email Self-Defense Guide by the Free Software Foundation](https://emailselfdefense.fsf.org/){target="_blank"} describes how this process works.
|
||||
|
|
Loading…
Reference in a new issue