-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1,SHA256 January 14, 2017, 10:59AM Top headlines from /r/worldnews: Former MI6 agent Christopher Steele's frustration as FBI sat on Donald Trump Russia file for months Porn censorship laws and age checks breach human rights and threaten privacy, says UN official Trump suggests he would be open to lifting sanctions on Russia http://archive.is/7xhCU My current primary use public key can be found at: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xDCD5C4E7C0B94A99 This is an update on the state of affairs of my OpenPGP keys: 2006-11-14: 71A1CF0B 568AD0C4 CB39B497 539736D4 86CD5860: 2006-11-28: BE293A1F EBCFBB42 CDE57EF3 1E700AC8 2E1CD8E5: 2007-01-09: 375CEF88 0EA0126C DBC30471 DE930821 3C7CA6C1: These keys (all three are 1024-bit DSA) were generated on old hardware that has long since been destroyed or erased. I have the private key for 0x86CD5860 and have revoked that, but do not have private keys for the others. They should not be used to send me any communication. 2007-06-11: 2DE80047 268BFA28 5D310867 6E715AF9 40FD6D2E: This 1024-bit DSA key is my long-term historical key which has been signed by numerous individuals who are part of the larger strong set, aka the largest PGP WoT. I am not revoking this key, but am discontinuing its use by moving the private key to offline storage, due to its use of cryptography parameters that are no longer considered best practice. This key has been used to sign both of my Yubikey NEO hardware backed keys. 2013-03-10: 2CFB8C54 6AA01752 93C60A4E 2AC21A9B 90B4BE8F: This 2048-bit RSA key was generated on-chip by a Yubikey NEO. I used it as my primary key for some number of years. In late 2016 I had a close call where the Yubikey fell off of my keychain in a parking lot and so I decided to replace the key. This key has now been revoked, and the private key is being retained for a short while longer before I destroy it and reset the Yubikey. The key has been superseded by the other Yubikey NEO hardware backed key described below (0xC0B94A99). 2014-06-16: 2F53C863 95F5BFDD 28C50388 4891DAE1 40FD6D2E: This 1024-bit RSA key was generated by an unauthorized third party using the tools at Evil32.com. I do not possess, and have never possessed, the corresponding private key. 2016-12-10: F4911EC4 7898A755 0EDA7C6F DCD5C4E7 C0B94A99: This 2048-bit RSA key is my current daily use key. It was generated on an offline Raspberry Pi 3 using the hardware RNG and then uploaded to a new Yubikey NEO, and simultaneously backed up to other secure offline storage. All copies of the private key residing on the Pi were then destroyed, and the public key was transferred to online systems. This key should be used for all regular communication with me, and it is the key I will normally use to sign things. -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQQt6ABHJov6KF0xCGducVr5QP1tLgUCWH4gWQAKCRBucVr5QP1t LnM6AJ0byjzgXfcOhLWL+hWiOZjW53u6kwCbBln8vxDC+XHjpM/VkFT7OJuMkmWJ ATMEAQEIAB0WIQQv10e0dU3GB9AFRqCqJrA0KiBMHQUCWH4gZgAKCRCqJrA0KiBM HeIGB/4gPZfBUW9azcFs1Z2BSsd+f5S6Vi6bhsrGkkh6YLg5e0Hnfu3jjeh5bhe0 YBCvYmcUdYUixOmFrsuRjeSuzFyZtpTgGhmSGw5d2eH91I3w4OuRCcIF3m5q8DM0 iA95HlgP94hoow+aVaNCPRMLn+UB7M7K2vZXLFLprcUwdVt+jJnNMgZ//hB7rUL6 O+3NJzxBYfnQr2x43y74SMO+DmBJLx49M5/rsW8vcoIjmWLxk9RE7dkwMaYs7qJA oywk7lY711dKvFmZkigZ9jNZkJA1UudX5D6HvWGu76A8SJRLm5laMVpwoY1jhaKY YZOlmer5uFLexkv2Oi5RjAQUxMWT =HcHE -----END PGP SIGNATURE-----