Update GPG Key page
- Added a page title. - Edits to content to improve clarity and flow.
This commit is contained in:
parent
db36f9cc7c
commit
f81270050d
1 changed files with 15 additions and 9 deletions
24
gpg-key.tsx
24
gpg-key.tsx
|
@ -1,3 +1,5 @@
|
||||||
|
export const title = "GPG Key - Foster Hangdaan";
|
||||||
|
|
||||||
export const header = {
|
export const header = {
|
||||||
heading: "GPG Key",
|
heading: "GPG Key",
|
||||||
subheading: "Information about my public GPG key and how to obtain it.",
|
subheading: "Information about my public GPG key and how to obtain it.",
|
||||||
|
@ -15,33 +17,37 @@ export default function() {
|
||||||
<section>
|
<section>
|
||||||
<h2>Intro</h2>
|
<h2>Intro</h2>
|
||||||
<p>
|
<p>
|
||||||
If you would like to obtain my key but you are not familiar with GPG, then I suggest reading up on GPG before proceeding.
|
Before proceeding, I suggest reading up on GPG if you are unfamiliar with it.
|
||||||
You can find more information and guides about GPG on the <a href="https://gnupg.org/" target="_blank">GnuPG official website</a>.
|
You can find more information about GPG on the <a href="https://gnupg.org/" target="_blank">GnuPG official website</a>.
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
I do not use keyservers.
|
|
||||||
This is the only place where I provide my key.
|
|
||||||
A key claiming to be mine somewhere else is definitely a fake.
|
|
||||||
</p>
|
</p>
|
||||||
<p>You can utilize the public key here to verify software and binaries released by me.</p>
|
<p>You can utilize the public key here to verify software and binaries released by me.</p>
|
||||||
<p>
|
<p>
|
||||||
You can also use the key to encrypt emails you send to me. In that case, I would also need your public key so I can encrypt the emails I send back to you.
|
You can also use the key to encrypt emails you send to me. In that case, I would also need your public key so I can encrypt the emails I send back to you.
|
||||||
The excellent <a href="https://emailselfdefense.fsf.org/" target="_blank">Email Self-Defense Guide by the Free Software Foundation</a> describes how this process works.
|
The excellent <a href="https://emailselfdefense.fsf.org/" target="_blank">Email Self-Defense Guide by the Free Software Foundation</a> describes how this process works.
|
||||||
</p>
|
</p>
|
||||||
|
<blockquote>
|
||||||
|
<p>
|
||||||
|
<strong className="highlight">NOTE: </strong>
|
||||||
|
I do not use keyservers.
|
||||||
|
This is the only place where I provide my public key.
|
||||||
|
A key claiming to be mine somewhere else is definitely a fake.
|
||||||
|
</p>
|
||||||
|
</blockquote>
|
||||||
</section>
|
</section>
|
||||||
<section>
|
<section>
|
||||||
<h2>Obtaining my key</h2>
|
<h2>Obtaining my key</h2>
|
||||||
<p>
|
<p>
|
||||||
First, <a href="https://static.fosterhangdaan.com/foster-pubkey.asc" target="_blank" download>download my public key</a>.
|
Start by downloading my key: <a href="https://static.fosterhangdaan.com/foster-pubkey.asc" target="_blank" download>Foster Hangdaan's Public Key</a>.
|
||||||
</p>
|
</p>
|
||||||
<p>
|
<p>
|
||||||
Check that it matches the fingerprint below before you import and start using the key.
|
Ensure that the key's fingerprint matches the one below:
|
||||||
</p>
|
</p>
|
||||||
<pre>
|
<pre>
|
||||||
<code>
|
<code>
|
||||||
{gpgFingerprint.trim()}
|
{gpgFingerprint.trim()}
|
||||||
</code>
|
</code>
|
||||||
</pre>
|
</pre>
|
||||||
|
<p>If the fingerprints match, import the key so that it's ready for use.</p>
|
||||||
</section>
|
</section>
|
||||||
</>
|
</>
|
||||||
);
|
);
|
||||||
|
|
Loading…
Add table
Reference in a new issue