My PGP Key


This page describes how to retrieve and verify my PGP public key.

I use PGP primarily for signing my custom kernels which I distribute. All source tarballs and Git tags created by me should be signed with this key. You can also use this key to encrypt sensitive email to me.

Details


Type Primary UID Fingerprint
ECC (Curve25519) [email protected] B82A 30B6 B359 60B7 2CF6 22EA C005 E3D3 9A5E D5A6
RSA (4096) [email protected] 0804 FE6A 3263 D008 B6A2 78E2 CE96 4AA2 C818 3D62

Getting My Key


From my WKD server

gpg --with-wkd-hash --fingerprint [email protected]

From a public key server

Curve25519 :

gpg --keyserver hkp://pool.sks-keyservers.net --recv-key 0xEF5D84C1838F2EB6D8968C0410378EFC2080080C

RSA 4096 :

gpg --keyserver hkp://pool.sks-keyservers.net --recv-key 0xEF5D84C1838F2EB6D8968C0410378EFC2080080C

From my website

Alternatively, download my Curve25519 or RSA4096 key and import it into GPG:

gpg --import 0xEF5D84C1838F2EB6D8968C0410378EFC2080080C.pub.asc

Verifying My Key


It is important that you verify that the key you downloaded actually belongs to me.

Best Option: Use the Debian Keyring (for Debian/Ubuntu users)

Since my key has been signed by several Debian Developers, you can check my key against the Debian keyring if you are a Debian or Ubuntu user.

First, install the debian-keyring package if it’s not already installed.

Then, check my key’s signatures using the Debian keyring:

gpg --keyring /usr/share/keyrings/debian-keyring.gpg --check-sigs [email protected]

You should look for the string sig! next to the ID of someone who is not me.

Second-Best Option: Use the Web of Trust (for advanced users)

My key is signed by other people who have vouched for my identity. If you know how to use the Web of Trust, you can use it to verify my key.

Weakest Option: Trust this Website

You can verify that the key you downloaded has the same fingerprint as is listed at the top of this page, provided that this page was served over HTTPS from my domain name. HTTPS provides some assurance that the page has not been altered. However, HTTPS is only as secure as the public certificate authority system. Thus you should consider this the weakest way to verify my key.

To calculate the fingerprint of the key you downloaded:

gpg --fingerprint [email protected]

Make sure the “Key fingerprint” that it outputs matches the fingerprint at the top of this page.

Using My Key


Once you have retrieved and verified my PGP key, you can use it to authenticate software that you have downloaded.

To verify a tarball, download both the tarball and the signature file (SIGFILE) to the same directory and run gpg --verify SIGFILE. Examine the output carefully for confirmation that the signature is good and came from my key.

To verify a Git tag (TAG), run git tag --verify TAG. Examine the output carefully for confirmation that the signature is good and came from my key.