All my keys are signed by the following Master Signing Key.
pub ed25519/0xE0CC7D788DA0EBF2 2019-07-29 [SC] Key fingerprint = 61F0 2B21 BA25 03A5 2634 5A40 E0CC 7D78 8DA0 EBF2 uid [ultimate] Alexandre Pujol (Master) <firstname.lastname@example.org>
The following is my GPG key for email communication. This email key is also signed with my former email key 0xce0ead7f07180c35.
pub rsa4096/0x5E86EC7730DED671 2019-07-29 [SC] [expires: 2024-07-27] Key fingerprint = BBD1 FEA3 F345 B8FC 72E8 5770 5E86 EC77 30DE D671 uid [ultimate] Alexandre Pujol (Email) <email@example.com> uid [ultimate] Alexandre Pujol (Email) <firstname.lastname@example.org> sub rsa4096/0x0482D107FE33DBD3 2019-07-29 [SE] [expires: 2022-01-14]
The following key is used to sign commits, tags and releases.
pub rsa4096/0xC5469996F0DF68EC 2017-01-09 [SC] Key fingerprint = 06A2 6D53 1D56 C42D 6680 5049 C546 9996 F0DF 68EC uid [ultimate] Alexandre Pujol (Git) <email@example.com>
These keys are attached to this page and are available on SKS server. You should verify the fingerprints of these keys using some other channel than just this page (e.g. my Gitlab & Github account).
This page is generated using the data at:
It has been signed with my master key and may be verified using the
public key. If you have trust in that key, you can verify that this page has
not been tampered by downloading the file:
and running the command:
gpg --verify keys.yml.asc