Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

What's your public key?

I want to verify something that you’ve signed, what’s your public key?

You can actually get my public key (for leo<at>pugetsoundsoftware.com)
from several key PGP/GPG servers out there, but for the record, here ’tis:

Become a Patron of Ask Leo! and go ad-free!



-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.0 (MingW32)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=0j0h
-----END PGP PUBLIC KEY BLOCK-----

Using this you can encrypt something such that only I can
decrypt it, and you can validate that something that’s claimed
to be signed by me a) is, and b) hasn’t been tampered with.

Do this

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

I'll see you there!

4 comments on “What&apos;s your public key?”

  1. Leo,

    Nice to see you use GPG and you posted your key. Here’s mine. :^)

    roberthazelett@gmail.com

    —–BEGIN PGP PUBLIC KEY BLOCK—–

    mQGiBD4/diwRBADr/Aj6KNKQVyJb25+lgx5FlQPAVoKiR7tX7jwckHxCUpXRqlN9
    0Q+8poirh/zX7JWiBrHB8tBCAw+6Tuawomjgr6rSlXLEMLS0Uu9Blfcg7nUpgbiz
    h8+BYRmY1hv3tVnX+V1QTfaS8RK7OPXdnvrMpQ5RTk1fAZYrpGqPKwxkZwCg/3D9
    iBaJ4nnAz+llXKaA9TQKEgcD/jS6hZQweg6FlUT0Q7IQsF0Z7ZKQryM1evlg5bVt
    hSzVVjYcMvya060jbHryHBEF2MJIp4f2W0wZN7s5yU4RjTEwoq8y+apoNLICJed2
    9GboKM4sBR+WPyedhZUC+M4ldflUruNZ+ic9jEQXKffX6H+8GGBLqWZgK9klf6mS
    CJ2eA/96y5/CoIJl7i4lvd9NGvhuxV7dRav1ao/dsWoRAB/Orgq1uYEPbyLhmAqB
    JxSw6JW2MLuLB2U5IRIXSZT2iuix56TSkouw01iwi06Fl/ZLi3cAchGCtaDBqyml
    B3be0ucXS61Py6w2slRKwo9vVbMlhKQiDzsYA1SM5FbtqxsEHbQUUm9iZXJ0IEVh
    cmwgSGF6ZWxldHSJAFAEEBEDABAFAkJaMr4JCwkIBwIBBAoDAAoJEG0eiTJmp7Vj
    zQIAn1gp+bAQj5bU9tlDBb5kO6pfcPlaAKDi0qde8vFkt3sGoPCjWlPeRIdvdbkE
    DQQ+P3mPEBAA46JprVJtfoJuSJ1qqjdgzKHiKmB0pTYUlm0M1KOicp4NPzvr44/q
    k2FpQACAr7CgcmyTEfKgUGEaD5JzRfUFYKmPAF40S5+HdSJbP1wnztYKtzGP8MYU
    7/cyz8i0VJQccL5viXC3+Hqy/zwNF84SJ2RHTF7QcxfqMtjsYmGMD3agV/JqPuDK
    2AqLApHo5W6p3g6rFRyj1aojl+h/z1LSGMin1qxVZw2vDlk4f2EjPcObTHUlp/S/
    7hMTu9BvZU/3ukXLtP2dFxJHtiOiXMvnMPZxz9mSfgMgJA3hhXKZAAxXn39dTWEy
    /sfjXr9kbcyzNaQOqN658Id/6hgMLEARpjxbpVNFtQXKhut26Roj/mWPWkIVgqHe
    0qhBAj9UCUMcGA2ZBn0gbaPXOsNEvJ5ZbVVnvAbJGzm9MBg8P1adKVjJFFhSTQAW
    ZSnZK6x2qV+vf2Ash+zJtInrpHQdNq+fhTFG24BlDofPVG1zmdfqcnA0XGh3YSUk
    myYduID2mSCJcgzva7OOh5Q9uZtQW7vgCq7PJbI9msdPbI0sW55q2ZRvjLF3mHng
    yUYmVP2TvvaD/UktHKhb/ngQDGNDGMTCEjJI0SRad31veyLmgsl5oGDETOHvZG2m
    uutvXh9u/kx+qBBrKhLwugZlEaEFQQsccflTeIwulDiCC75sx14vg0sAAgIQAOOX
    TNO47N230gdU0p2ILN6bsqvrFmQMQpSVtid2X3Z3C8T9xNQ85zaHdAZjcQKTRjOE
    u5gMK38MyoTFSkQwmZCz1RcHag9k7TFeUU9HwNEArPVvUQc7TI+OQyyEJbBI3cHH
    Ovl7HxtBd4c9qaF+JdwsxvnHcAzNQb4eCzIlnNJNOk4eCObowZ9UENLxSl6O0RPY
    Xz6dbffOFEGWe9Vi9JeasyS+/sYZuq3f5p6zCOp8Zyy1a2ptmlnQzFgj7pC8BoTO
    eI+2z+tYU5rFiz1Hq9k1bEtQtbPRSBscrhO7D0M5Zl0mps5syHVPTczeKuRfUmQJ
    qy4gSj43kjg4naoKwhV4ok8tHyWqNwvcYgtLWaLIRC0BDYXFxf4BnAToGAApmSUC
    7Z/7zOQYnx8q3ivosDLLucEsRcaZ08P2gafk+31FWxx9qq6OSRTFQ0XkmH4FSq4N
    /eqc0qVxTY63XJHmgLxLqeFYVZjnS2BUrs9y488+ntC2a0UxM6CKgW8uTmjIfcP9
    axdpNiosFgkdpqbr7ggqbjGUCro/CrNbo0f3UROykc9cbIpVZnEIPuHQki02Bipc
    VpNJ3pz2+oWbrHVAVJ8mkw/im0cVoCPyHg4G4T7Ci1pstM1f8YhUi3eofPKFZJYV
    CvaCF7XPO3dnr59+iQ6Xe8ZE/WKHiXCxTcQbdLE1iQBMBBgRAgAMBQI+P3mPBRsM
    AAAAAAoJEG0eiTJmp7VjGdAAoPtK2hWatlI7eypsyX3nFOtw5uaFAJ0RwLxHOJjS
    zuqTfmahz7gorlQQwA==
    =+Vvb
    —–END PGP PUBLIC KEY BLOCK—–

    Reply
  2. i have been trying to understand the public key/private key thing for ever.
    would it be an accurate simili to say
    you give keys out 2 everyone but you pick who puts it in the lock?

    Reply
  3. I would say it is more like the master password at a bank, where the president of the bank types in half the password, then he leaves the room and the vice president comes in and types the other half. You need both halves to get verified data.

    Reply
  4. I think a good analogy to this would be:
    Imagine the public key is a bunch of opened safes with a lock on it (partially disregarding the fact it could be physically tampered with). Then you send this open safe to someone and they place the item in it and shut the door. Now, even the person who placed the item in the safe can’t even get back at what they just locked up (encrypted). The only key that can unlock it is your key for the safe (i.e. your “Private Key”).

    Though I stated to disregard the physical tampering as a possibility; if the algorithm was weak enough tampering may even be able to occur with the digital key pair, but this is highly improbable. Hope this helps.

    Reply

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.