$ sq dump --hex message.pgp New CTB, 13 bytes: One-Pass Signature Packet Version: 3 Type: Binary Pk algo: EdDSA Edwards-curve Digital Signature Algorithm Hash algo: SHA512 Issuer: 83F8 2E4F E9A5 E098 Last: true 00000000 c4 0d frame 00000002 03 version 00000003 00 sigtype 00000004 0a hash_algo 00000005 16 pk_algo 00000006 83 f8 2e 4f e9 a5 e0 98 issuer 0000000e 01 last
$ sqv --trace --keyring tails-signing.key \ tails-amd64-3.11.iso.sig tails-amd64-3.11.iso Will check signature allegedly issued by A8B0 F4E4 5B1B 50E2. Found key A8B0 F4E4 5B1B 50E2. Checking signature allegedly issued by A8B0 F4E4 5B1B 50E2. Signature by A8B0 F4E4 5B1B 50E2 is good. A490 D0F4 D311 A415 3E2B B7CA DBB8 02B2 58AC D84F 1 of 1 signatures are valid (threshold is: 1). $ echo "Just check the exit status: $?" Just check the exit status: 0
OpenPGP is a proven standard for storing encrypted data, and for managing encryption keys. OpenPGP was standardized in 1997, and is widely supported.
OpenPGP is the most widely used method to encrypt mails. It is supported by most mail programs either natively, or using a plugin.
OpenPGP can be used to protect data at rest, say backups or passwords. With OpenPGP you can be confident that you can still read your data after decades.