PGP is one of the de-facto standards for encryption. Since January 2000,
I've been using GNU Privacy Guard, the
complete and free
replacement for PGP.
I have used a few GPG Keys: 0xF2FEBB36 from until May 2002, 0x2C71D63D until January 2011 and now 0xFB1BA7E9. Please download FB1BA7E9.asc or look up my key in the "normal places" - you may find keybase.io/suter useful.
Key management is the hardest part of any cryptographic system, and PGP/GPG is no exception. Feel free to contact me to arrange verification of my fingerprint or to arrange for me to sign your key.
$ gpg --fingerprint 0x34767E026D978AFAA1804E776F37C732FB1BA7E9 pub rsa4096 2011-01-13 [SC] 3476 7E02 6D97 8AFA A180 4E77 6F37 C732 FB1B A7E9 uid [ultimate] Mark John Suter <email@example.com> uid [ultimate] Mark John Suter <firstname.lastname@example.org> uid [ultimate] [jpeg image of size 7296] uid [ultimate] Mark John Suter (keybase verification only) <email@example.com> sub rsa4096 2011-01-13 [E]
Please pay attention to the verifications (it's what makes the web-of-trust work). If you are not completely confident with the web of trust, read the Validating other keys on your public keyring section of the The GNU Privacy Handbook.
I have some tools to help with Key Signing Parties and have used them in the past:
- 2003-03-01: Humbug meeting
- 2003-08-06: SAGE-AU national conference
- 2011-01-28: Linux.conf.au