-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512,SHA1 Date: 2015-10-05 I am transitioning GPG keys from an old 1024-bit DSA key to a new 4096-bit RSA key. The old key will continue to be valid for some time, but I prefer all new correspondance to be encrypted in the new key, and will be making all signatures going forward with the new key. This transition document is signed with both keys to validate the transition. The old key was: pub 1024D/B399F3FD 2005-10-13 [expires: 2016-02-12] Key fingerprint = 23B9 849D 120A 6CAF 9931 EC8D 8457 72A4 B399 F3FD The new key is: pub 4096R/CD3755FB 2015-09-19 [expires: 2025-09-16] Key fingerprint = 37DB 18EE 7668 BDA4 1D66 1DB7 B91A 917F CD37 55FB To fetch my new key from a public key server, you can simply do: gpg --keyserver pgp.mit.edu --recv-key CD3755FB If you already know my old key, you can now verify that the new key is signed by the old one: gpg --check-sigs CD3755FB If you don't already know my old key, or you just want to be double extra paranoid, you can check the fingerprint against the one above: gpg --fingerprint CD3755FB Regards Georg -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBVhLDr7kakX/NN1X7AQpr4BAAp1C1PVYBII/9Y0wX5QqNLvSnIzlcGSPP IxC+6Y94/29a7zFjBJbxAKbnjhVsCH8a8k1QwIIoHRJaOV7KAtHGRAa3s+xnPW6N C4SUuzPfxaaIxzhA1/MEObuAyB1h4vhZ2pYunobYCVFsRaDpeQq8z+nE2POfBoHu 3BIqxo6y8mPIm8jl3vEeDbIiSlHR8+GC8Qj7b1zMvtYurxbFb3u0Vx8WSe1tr57A XqPTdmtndDbu426G9oLuPMEc3FmETffd2Wa8Gr/D8cGQgugfdSVOi3owYzFS0MRo fGWgRZxpJZ3As5kpg16utpTRccOTs4B+yMR53EoNbOJ1uB5K3bzSYomU1pt/VKfy Ge+0uFV8JtTHYul/zkejKPW/KIbRMcigPx/kGdubwpivuqSCX8C4xGpLH9vYlHFv cgPRUlAhK2MRT7Qeqq4vw8lwhjhdlI6qXH1YJAGHcWXa6+dKaO9sBFWwo/uo7dLj wIa22kTlt93Nw5Xw7zhyUp/ZRmRVoH+D8uXXWBZ5l78T2PlmaCpHwLlgsKmKZSBl 8kP6cw5rI3MMKJt2gtNB4R6tIBktjS2xCEUE6RPE3NSr0ZvVaI4RodpMFoqemZmZ fnLKPshzSo89zGYemN9ugJFDoOJoisC7/+/pQU8lGFURVczQuIcAVrHkcvlAjDH8 KCljk5bWjpyIPwMFAVYSw6+EV3Kks5nz/RECSeAAn2dTUtGUdd8MZtMB+AZA8ma3 MG9BAJ98dDJ8fzJ5rT0zyUzT/5YB+P51mQ== =kQoN -----END PGP SIGNATURE-----