OpenPGP Key Transition Statement⚓︎
To verify my key transition please manually verify it with this file or copy the below text in to a text file and save it to your local computer for verification.
Note that the original url stated in the key transition file has changed. Use the following to verify the key:
wget -q -O- https://www.remyservices.net/key-transition-2015-01-08.txt | gpg --verify
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256,SHA1 OpenPGP Key Transition Statement for David Remy ([email protected]) I have created a new 4096-bit RSA key and will be transitioning away from my older 2048-bit DSA key. The old key has not been compromised and will continue to be valid for some time, but I prefer all future correspondence to be encrypted to the new key, and will be making signatures with the new key going forward. I would like this new key to be re-integrated into the web of trust. This message is signed by both keys to certify the transition. My new and old keys are signed by each other. If you have signed my old key, I would appreciate signatures on my new key as well, provided that your signing policy permits that without re-authenticating me. If you would prefer to re-authenticate me please let me know and we can make arrangements. The old key, which I am transitioning away from, is: pub 2048D/922BAF0E 2014-05-27 [expires: 2037-06-02] Key fingerprint = CD83 E9DA 0A61 47BA B708 21F3 BDE9 9AC8 922B AF0E The new key, to which I am transitioning to, is: pub 4096R/43DE5DE0 2014-10-31 [expires: 2037-01-01] Key fingerprint = 7889 EE32 FB1B 60B3 EAE3 429E DF39 AF44 43DE 5DE0 At the time of this message, the entire key may be downloaded from: https://www.remyservices.net/pgp-public-key To fetch the full new key from a public key server using GnuPG, run: gpg --keyserver keys.gnupg.net --recv-key 43DE5DE0 If you already know my old key, you can now verify that the new key is signed by the old one: gpg --check-sigs 43DE5DE0 If you are satisfied that you've got the right key, and the User IDs match what you expect, I would appreciate it if you would sign my key: gpg --sign-key 43DE5DE0 You can upload your signatures to a public keyserver directly: gpg --keyserver keys.gnupg.net --send-key 43DE5DE0 Or email [email protected] (possibly encrypted) the output from: gpg --armor --export 43DE5DE0 If you'd like any further verification, or have any questions about the transition, please contact me directly. To verify the integrity of this statement: wget -q -O- https://www.remyservices.net/s/key-transition-2015-01-08.txt | gpg --verify David Remy ([email protected]) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iF4EAREIAAYFAlSvedoACgkQvemayJIrrw7EyQD+JsvN/J02Dbk2bPA1sQd8LKrN zNfG4iKC+EIhlOgoepABAIPj//Pb31tbVDEBjkdLwKXTIPyqc8klOEaGGCOPLqB2 iQIcBAEBAgAGBQJUr3naAAoJEN85r0RD3l3g8YYP/iJ7p573J57q5eU8JaO1hKHD pomIYSKjYCpCCXBSzXmfNgCbUkYPD+woIH8RJU9kMBgLGCQj1qbpNaZdvjdI6vJP r1El2JZ459zr2/RRTuKxA7s5mmvoUEIVjcp0nsYJbfjH747UJhW0oLCr/Ufi5wzX fKNKi9QTHVA/KlxwKeFJHvlkOhd01wYlylVXLqnihdbkHqmldYJ7NJ5/mlPIheJA twKhQke1BnFqPRxBdCuwpG7qC3LH8dHviWzanuiFQoYTsCHWWpraAgSeEz6z7xcQ p9atlus/Ae+/9inqlFE4bcH1TcqulL4vvSwMa5wPzjwIrcfDljUzbHzOnustfpd4 DL+qYTka8STcdScm9yviW6+oJja8Dp52WxnICQgZyNcSYFbmRaz94jMgp6MNA22w CRPodUWXjIu+uJ3zBYYg9aHJ2H86fLFSruW902CWNVqkU+DZU9Uv0g6aMlO0wBmb +wWcZk3Y+ZGWAESZga9C6FtSPRZPaAbitZeF8Ql0Utpf/sdH1+8uTdnFSHTID2Lb ZKgG0Fu8P7w+08iyL6p9EpAgQOU3dpBLshQMTr/u0DRk47yPPHrag7DZYitCLLpS w+qQbL6dOwQAXLp3FF9uUBfbl7qqPYF0zrXt2Jj7F6riC5V6retjU92z3VJ4Y11n cGVTc9yu2Dw5iSeIGX1F =t5zF -----END PGP SIGNATURE-----