I’ve created a new PGP key pair… so if you’d like to send me encrypted mail, please use the following public key (download key):
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0.20 (FreeBSD) mQINBFHfI64BEACZIZzH4sPp2+cgIaSi6tiTG8Pa4WXnnS8lw17W792eW9Vp0kg6 txabv/p32o0PTWH8rDKFo09C9BwFcs3mjRL3OkS92rN6y8GEQgAaEhMRAY3FG+6t LOADbSdU9Rhfqh8rzvSSZ36bAf6BwqXIfxxmU9f5NTeGJGDUB4+AaT2aD0ozLJ37 pHuH5ee/g4O5sosCn++aLOl9WVcCS/BW/y8uW+p7+6XOH/3X/LsjNveQtfzO7yqD u0jkonhvKDaACRoLNyIo3HU/MEhVxyGtPANBI+OoesZ3TkEDFgCnYGQQQon/3SRM bzBjuHmP3h1bD03Lt2FO9KGsBUPT3uo5wKVCA6nfOj6b/MSvOfeTWkNDPyVZRBgx tyEbwxxpnOf36l/faH3C6magLFu93NFgEI6l3tB+Cm8gNkb3n7rpGk4txq+79gWX MXT+6s6tzXqE0Mv9ReRBWZ85OK44SrYCO8QUeoqBHUckNoA0MhDF0PaougnuRiPR KRPaNR64fWVBYU2j9i5Weq9GrDzAoULNc7Avx8/JJdQmOO/m/Hu7TCWVg/KphTb4 EWhfPsRRoUTsMLXiVse8n2TbOsIyWRpy0SEz4hrNeXmAnY8bhLWEUm8M+jccoGHp Oorl6IgcVSkWUgWTBXP9QmV3B0F8oAcYI1tsC3bsCmGAcBx7MMznnA9kfwARAQAB tB5GYXJpZCBIYWpqaSA8ZmFyaWRAaGFqamkubmFtZT6JAjkEEwECACMFAlHfI64C GwMHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRDLOyP7G3wpxLakEACX9/Yf reUo9Umqol1ai3pEMpuRwhVmypgMgaw5KyhBKcDshsxBl3h5VYzU3y1MrstWtIjV gb/4mIemWJSEi3VetfW+e9KC0KTLzC2FRo+ZoVSBGlBRuToM2q9IGQMxz5urkgDn RRQhaY6utsPFvixaoo0CgiPiAUR4MS5Z1IiCoCiH+vfQOe7CgIfZoqOVuIBVPHKB lDxTq/mMd1rWebaRkvcvBgHlL3ZlI4nCSiTa9KEkMEJJRWMuxLxvlw8YaTtoxnQ2 26Y6nq0JfyZyd+rIdUNVdeSf8PlO65SiwkutrtqYlrGGcZvKKpwkHaKTz4EbZoX0 4fzvWLxtvdz9KqWErCOsNVb9s6BmvPFvL53Mfckn/ej3TR3e8VSWtRLGnuT0TjMG h9IObYFtYDehccRx1FJIfWkB/h9xJceccOc8G0XR/OrR0NVvC6i3Arrj81XidiRS rFqXw9z9dxsng3+q/nQKX/Zscta/fOET2w6gVqVcoBKKBJCBxlBreyTs/GhWqQHr uc4iGu7zQFZmkAlcLe+SQ7qbdCHENYY3C513jnTLR9mBkWtgy1Jdy9v6ExVvCcw7 MiY2XT3fdQNqM/RpC6CVwkZxodTYnOFcvyDKReeNizzSnx9cOU/n892/4Y/HYwaC X6km2nJMr8ZdrmTYOp9cdolAuvGvILOXR0q9l7kCDQRR3yOuARAAmHCCPg3ChJks WaS7w3APj4z7wtQ4W798ULpI9XsUo60uMKCfsgVrjqX0w0kXZ8mXPZ2i//0ZRwu8 jP31VtFzZ+s7QuXXLLPC9O6rAnQUrcqbOl3r0jvKr+9YItIGET7+/LWPV8dwnUnf Ncg8c1bTV4lauJ3M8e+gT7rTeBXtjFadCqx7B01QZd8R10eyJIKPcjyZI8eK4Djm dmPF3dpazklPrPVBlePmBrHQpSzvqCfJoxbX9ot7xwfen2X1/M/saZWYrl2nchPq tKxspl4lZq99PndfY0Wzi09gpJGPTWguRZ/gzcPM/Ee702NOVHrNBb0twqLXbgIz 2kuU8pk5yQk3k4cRCzd6dMVdIDj7dZRvC77yCSb3jKytGMCh29VeVK9IlJ4i0lr5 +AqmLF0A9IE0l2C4XIWB5lMMHcqQR/pDgtG3xFzF6gggJxCLm8vmliipCbfolrj6 qIUJzFHezFZvk5/s/8V5wd+fHjC/4mac8jAtPIlYRkZwQO1v2KhJKfLAAmJ9AFQO GMMMdXuUzC3SUvORajoDiLa/HOeWIDBHCdcNerxF5KN8gHTJR626umu8mG0Y1+uL OcNX4Q+RKb4BMXHFK6heRXJbNauKm4mWKnv0b6Ci2SMMB/IjmIZavZgZNjllEMdJ vMnFwknWyhhzEbsZEfzaKw7b8PHNy90AEQEAAYkCHwQYAQIACQUCUd8jrgIbDAAK CRDLOyP7G3wpxNz2D/9YUDvhbhOdmugx9fBnA1ZWqsSk/EgdK2m1NKbYjZXbIAzA sCM/rKiPKqCkYF0BslOttOEYxKXttkjLB0VA13wH7LyWYSq9aEtpQ/Cgw2E075zW oCWsMUQLpuTna9mycRWa7khbLdFbC37gCatwcg8UJbuvclExBWX3r8oG61Evqotu HWqS7R/C0Ec/QP4Y3MaIPRXgQC4yK04O/qI74VRhsUxMAfmPlDeiFOZ+QVxPXpJD L2x/6iKiBhu/vCJapycUgOATmAkJA3Kd3M8u8WnCh91rhbqNKjzXdtCUpkNAI/6P 5pQnYYfue2CKJjWWuYtsxbjKIBZmVoUnLHEpeUEseaZnm3ftOvCn9/G69OCQhXdV coUanQ7Nv9fMddZWRxBYycJzViIxYPkJ7542wgbodnm+VUX0V/DmR5MQkpPAT74S 4gqL0QDguCUPrkP3X7UIh/OcU6AEV7cMMrNGDdES23i2nzak92OYyIjviowg0TFO eSMn/tuZBbJoJsDBAO3lWBCGwoqoUuPy0dGL8u9cG8F60rsJlgYBnZdI8i6GbceE ZE1jaRjJe2BqCk6czQxZuNNcnnppn8afYt/D/o5owR7CgFNnnbkpYz216z0osIdE ukB69ILCIT9HCOSrmeTH1tdJUiQ334zZVsCYUX7g5O+oKZ05IK94hSsLT+VrmQ== =mcfJ -----END PGP PUBLIC KEY BLOCK-----
Fingerprint and Key-ID (if you fetch them from a key server):
pub 4096R/1B7C29C4 2013-07-11
Key fingerprint = 3FD7 A984 5A0F 6E07 0592 049E CB3B 23FB 1B7C 29C4
uid Farid Hajji <This email address is being protected from spambots. You need JavaScript enabled to view it.;
sub 4096R/2B163053 2013-07-11
Here’s a quick intro to PGP.
You can download a free copy of the PGP encryption software from http://www.pgpi.org (available for most of the common computer operating systems, and also in various Open Source versions like GPG).
There’s one more point though: if Bob managed to disseminate his public key as widely as possible (on websites, blogs, forums etc..), Alice could in theory check the public key she got directly (?) from Bob with the public key that Bob sent all over the Net. If they match, Alice can assume that Mallory didn’t modify Bob’s public key en route to her. Is that a safe assumption? Well, not really.
If in doubt, Alice should trust the key she got directly from Bob, because everything she reads from the Net may be forged before it reaches her. Everything that Alice gets from the Net may be changed en passant by, say, an NSA bot that switches keys with keys it creates itself. Only the key she got from Bob directly (e.g. they exchanged keys via USB sticks during a personal meeting) is guaranteed to be unmodified. Everything else is to be taken cum grano salis.