My GPG key.

Download my GNU Privacy Guard (GPG) key for validating my signatures and encrypting your messages to me. GPG is also known as PGP or OpenPGP. My key has fingerprint 6A40 C7E0 7CC9 50AB 3C51 248B CF5B 8B76 CF4C EC34.

In the following example, the fetch and gnupg utility is used to download my GPG key, insert it into the key ring of GnuPG and set the trust level.

% fetch -o - https://www.micski.dk/gpg.pub | gpg --import -
% sh -c 'echo -e "5\ny\n" | gpg --command-fd 0 --edit-key CF5B8B76CF4CEC34 trust'

If you use Thunderbird Mail, you can configure it to use the key ring in GnuPG instead of the built-in key management. This is done in the directory for your Thunderbird profile.

% cd ~/.thunderbird/*.default
% touch user.js
% chmod 0600 user.js
% echo 'user_pref("mail.openpgp.allow_external_gnupg", true);' >> user.js
% echo 'user_pref("mail.openpgp.alternative_gpg_path", "/usr/local/bin/gpg");' >> user.js

My SSH key.

Download my SSH key for granting me access via SFTP or SSH to your server. My key has fingerprint nfMq BkY/ JeDM Ignj OB3v /vi4 bruf mir3 bAf+ DhKW vfw. My key should be inserted into your SSH server key ring, which is usually .ssh/authorized_keys in the user home directory.

In the following example, the fetch utility is used to download my SSH key and insert it into the key ring of your SSH server.

% cd ~/.ssh
% touch authorized_keys
% chmod 0600 authorized_keys
% fetch -o - "https://www.micski.dk/ssh.pub" >> authorized_keys

If you prefer to manually copy and paste my key, you can do so from the code below.

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZO4el3RdVbz5MZLkgqz9XYU7u9gYfXVUiObLy3cELNpgQTgQK5YlqDH2Th24U2KtdpFXy7T+P1glLKQS2g0Bk9VFSYZOCDu/Oq5ya9+wv9sfdP/7ntOZAodwqN3eTY/GrltyU+8PXoxiLRpC+vhsWodVrKUR2QUWEjLVQ6bCMNDZo3VTHTFTtMMiYGI5gYygLhU3MxlFxyAgcJ9zc2ABI+WSWu6i6bjKZI7EW0mPJx6CIDEx6ohXMOjm3JoPC4aEA88Ksm6ISoPwlxP59BYPuVSS6I+isDiOzpS+yHaTgHfBj2de7+llOqX5+6/suowmGG7LNB9hljAvvUg+O8Izb micski

My certificate authority (CA) root certificate.

If I have processed s certificate signing request (CSR) from you and returned a signed certificate, then you should distribute my root certificate from my certificate authority (CA) to browsers, mail clients, operating systems or other types of clients of your encrypted service. You should find my root certificate bundled with my signed certificate.