-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I have two PGP keys.
One, 16F13480, is signed by many people in the open source community. It is a
4096-bit RSA key.
The other, 0FBC4A07, is superficially worse. It doesn't have any signatures on
it. It is only a 3072-bit RSA key.
However, I would prefer that you all use 0FBC4A07.
16F13480 lives encrypted on disk, and occasionally resident in memory on my
personal laptop. I have had no compromises that I'm aware of, so I'm not
revoking the key - I don't want to lose all the wonderful trust I build up. In
order to avoid compromising it in the future, I would really prefer to avoid
decrypting it any more often than necessary.
By contrast, aside from backups which I have not yet once had occasion to
access, 0FBC4A07 exists only on an OpenPGP smart card, it requires a PIN, it is
never memory resident on a general purpose computer, and is only plugged in
when I'm actively Doing Important Crypto Stuff. Its likelyhood of future
compromise is *extremely* low.
If said smart card had supported 4096-bit keys I probably would have just put
the old key on the more secure hardware and called it a day. Sadly, that is
not the world we live in.
Here's what I'd like you to do, if you wish to interact with me via GnuPG:
$ gpg --recv-keys 0FBC4A07 16F13480
gpg: requesting key 0FBC4A07 from hkp server keys.gnupg.net
gpg: requesting key 16F13480 from hkp server keys.gnupg.net
gpg: key 0FBC4A07: "Matthew "Glyph" Lefkowitz (OpenPGP Smart Card) <glyph@twistedmatrix.com>" 1 new signature
gpg: key 16F13480: "Matthew Lefkowitz (Glyph) <glyph@twistedmatrix.com>" not changed
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u
gpg: next trustdb check due at 2015-08-18
gpg: Total number processed: 2
gpg: unchanged: 1
gpg: new signatures: 1
$ gpg --edit-key 16F13480
gpg (GnuPG/MacGPG2) 2.0.22; Copyright (C) 2013 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u
gpg: next trustdb check due at 2015-08-18
pub 4096R/16F13480 created: 2012-11-16 expires: 2016-04-12 usage: SC
trust: unknown validity: unknown
sub 4096R/0F3F064E created: 2012-11-16 expires: 2016-04-12 usage: E
[ unknown] (1). Matthew Lefkowitz (Glyph) <glyph@twistedmatrix.com>
gpg> disable
gpg> save
Key not changed so no update needed.
$
If you're using keybase, "keybase encrypt glyph" should be pointed at the
correct key.
Thanks for reading,
- -glyph
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)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=k0u9
-----END PGP SIGNATURE-----