-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
You can fetch my public key from Ubuntu key server:
gpg --keyserver hkps://keyserver.ubuntu.com --recv-key 5BEF5813ACA297CEA6F74C32FD7899D296E6FCE2
To verify:
gpg --fingerprint 5BEF5813ACA297CEA6F74C32FD7899D296E6FCE2
You should see:
pub ed25519 2025-09-21 [SC] [expires: 2028-09-21]
5BEF 5813 ACA2 97CE A6F7 4C32 FD78 99D2 96E6 FCE2
uid [ full ] Jimmy Mi <jm33@jm33.me>
sub cv25519 2025-09-21 [E] [expires: 2028-09-21]
The following keys are also in use:
ProtonMail key
739673C5A6C3797A12986FFF410C99D49CF295D2
Git commits
A914BB005F8A42F36C2997594876EC6D60BDB1DF
6D15BC0F5325CFD19E54568E8F97F3B56FB4E276
You can fetch them using gpg with the same command above, just replace the key fingerprint.
Use ProtonMail key for emails, if you have concerns, encrypt with 5BEF5813ACA297CEA6F74C32FD7899D296E6FCE2.
Sign my key to trust it:
gpg --sign-key 5BEF5813ACA297CEA6F74C32FD7899D296E6FCE2
To upload the signed key to Ubuntu key server:
gpg --keyserver hkps://keyserver.ubuntu.com --send-key 5BEF5813ACA297CEA6F74C32FD7899D296E6FCE2
Thanks in advance if you decide to sign my key!
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQRb71gTrKKXzqb3TDL9eJnSlub84gUCaM9z1AAKCRD9eJnSlub8
4ptvAQDGtjM89OF2/eWcG33uF1Xd+8/B7ZGtZW1niAyosAuD/AEAj3Z03wIGNHCu
ipG9AZU/ZSTmhICZYqByOBQwlkHPjAA=
=lOHt
-----END PGP SIGNATURE-----