-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sat Jan 16 17:27:47 CET 2010 After seven years I decided to set up a new OpenPGP key, through the FSFe Fellowship smartcard, cleaning up after the previous history of the key. The old key was not signed by anybody, so there is no web of trust to speak of that it has to be re-integrated into. For proper record keeping, though, this message is signed by both keys to certify the transition. The old key was: pub 1024D/69875563 2003-12-21 Key fingerprint = AA18 FC62 0608 4903 B74F 43AC 7B68 75FB 6987 5563 And the new key is: pub 2048R/BB592443 2010-01-16 Key fingerprint = F204 568C 03BD FD49 60EC 2DCC 1A82 AD57 BB59 2443 To fetch the full key, you can get it with: wget -q -O- http://www.flameeyes.eu/flameeyes.gpg | gpg --import - Or, to fetch my new key from a public key server, you can simply do: gpg --keyserver keys.gnupg.net --recv-key BB592443 If you already know my old key, you can now verify that the new key is signed by the old one: gpg --check-sigs BB592443 If you don't already know my old key, or you just want to be double extra paranoid, you can check the fingerprint against the one above: gpg --fingerprint BB592443 Please let me know if there is any trouble, and sorry for the inconvenience. Regards, - -- Diego Elio Pettenò, aka “Flameeyes” P.S.: thanks to Daniel Kahn Gillmor for the transition message template. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) iQEcBAEBAgAGBQJLUe2vAAoJEBqCrVe7WSRDU0gH/3TF2XvoQ6D23d+R1cRIrS86 vUjjqEEHEpC/7NrfgyT8oG8KK5VKpmglrq2IEbVNoFwoChAviJbF9V9QNRlCWA2s Unk4CTjv9H29fzXErtO6c2/i6ZlyBuON0z+bxZk7672IY+dtwvmXTFj2LT74QRwV 9+y4CLFztyvQzy6U6GX44DMME/Eeyd9AHU10Csyj7EvS0ujXj49bicZdoFH5qV7R /yZnQpM3UFTgDRO6/b7LlfbG3Oi8cr/gfj70U5uBlTsUxFx0UEz0ayAFHKtYnL/a 8EvuPb6PPe5x/ZCbk2ZR6ogHca2zWi8/l3aJ8kTLTRx9XYIMec8I0XFd1U+HsLSI RgQBEQIABgUCS1HttAAKCRB7aHX7aYdVYzuVAKDhhV/Mwa+3h558eymfj14GnC51 IgCdGyxu3kO8eB5uWwMMLPmZ6+AkCXU= =a/xx -----END PGP SIGNATURE-----