Skip to content

OpenPGP Key Transition Statement⚓︎


To verify my key transition please manually verify it with this file or copy the below text in to a text file and save it to your local computer for verification.

Note that the original url stated in the key transition file has changed. Use the following to verify the key:

wget -q -O- https://www.remyservices.net/key-transition-2015-01-08.txt | gpg --verify

Text Only
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256,SHA1

OpenPGP Key Transition Statement for David Remy ([email protected])

I have created a new 4096-bit RSA key and will be transitioning away from
my older 2048-bit DSA key.  The old key has not been compromised and will 
continue to be valid for some time, but I prefer all future correspondence
to be encrypted to the new key, and will be making signatures with the new
key going forward.

I would like this new key to be re-integrated into the web of trust.
This message is signed by both keys to certify the transition.  My new
and old keys are signed by each other.  If you have signed my old key,
I would appreciate signatures on my new key as well, provided that
your signing policy permits that without re-authenticating me.  If you
would prefer to re-authenticate me please let me know and we can make
arrangements.

The old key, which I am transitioning away from, is:

pub   2048D/922BAF0E 2014-05-27 [expires: 2037-06-02]
      Key fingerprint = CD83 E9DA 0A61 47BA B708  21F3 BDE9 9AC8 922B AF0E

The new key, to which I am transitioning to, is:

pub   4096R/43DE5DE0 2014-10-31 [expires: 2037-01-01]
      Key fingerprint = 7889 EE32 FB1B 60B3 EAE3  429E DF39 AF44 43DE 5DE0

At the time of this message, the entire key may be downloaded from:
https://www.remyservices.net/pgp-public-key

To fetch the full new key from a public key server using GnuPG, run:

  gpg --keyserver keys.gnupg.net --recv-key 43DE5DE0

If you already know my old key, you can now verify that the new key is
signed by the old one:

  gpg --check-sigs 43DE5DE0

If you are satisfied that you've got the right key, and the User IDs
match what you expect, I would appreciate it if you would sign my key:

  gpg --sign-key 43DE5DE0

You can upload your signatures to a public keyserver directly:

  gpg --keyserver keys.gnupg.net --send-key 43DE5DE0

Or email [email protected] (possibly encrypted) the output from:

  gpg --armor --export 43DE5DE0

If you'd like any further verification, or have any questions about the
transition, please contact me directly.

To verify the integrity of this statement:

  wget -q -O- https://www.remyservices.net/s/key-transition-2015-01-08.txt | gpg --verify

David Remy ([email protected])
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=t5zF
-----END PGP SIGNATURE-----