Cryptographic Identity

PGP Public Key

Use this key to encrypt messages to A1131 or verify signatures. Full GnuPG command-line guide included.

GnuPG / OpenPGP Ed448 / Curve448 Signature verification
Public Key Block
-----BEGIN PGP PUBLIC KEY BLOCK----- mDMEZ1wQ4RYJKwYBBAHaRw8BAQdArkE1W3LBkW1Mqii3z3RbP8I0khz5q1hAFNTs vn+I4H20H0ExMTMxIDxudWxscG9pbnRlckBpMnBtYWlsLm9yZz6IkgQTFgoAOwIb IwULCQgHAgIiAgYVCgkICwIEFgIDAQIeBwIXgBYhBEsKOGUw14kVdDXcdIkTj7Uv 3X/BBQJnXMqJAAoJEIkTj7Uv3X/BzdsA9ia8VCHcGskWvRbKi/fnWXehMYNLilhJ NL1SoboggssBAKIEa/WRGHTyKq+Gw/Ac04yfgceZQhTwsQfzTTW4uCoJiJMEExYK ADsWIQRLCjhlMNeJFXQ13HSJE4+1L91/wQUCZ1w+AgIbIwULCQgHAgIiAgYVCgkI CwIEFgIDAQIeBwIXgAAKCRCJE4+1L91/wRRiAP4xLROw5JScqno+e4t1H5myAeBJ rTMA247GdO8L5lqybQD5AfRTuK0wqdh5ZfC9cQ9zx6GI/NFdqLyjhlhgtHN7Dgm0 HEExMTMxIDxudWxscG9pbnRlckBtYWlsLmkycD6IkwQTFgoAOwIbIwULCQgHAgIi AgYVCgkICwIEFgIDAQIeBwIXgBYhBEsKOGUw14kVdDXcdIkTj7Uv3X/BBQJnXMqa AAoJEIkTj7Uv3X/BEY8BAM2uaLvIluxDkeU5WL8rEC5XcS14J9bA1qIHbuov4noV APsGLo3ne0cQDSvcLa29Nqf10B5uHFZKWgW0b26a4jU9Cbg4BGdcEOESCisGAQQB l1UBBQEBB0DyGoyitgg59P9w5FDY3URGUD1qAEiOo1EWUUiicMgKXwMBCAeIeAQY FgoAIBYhBEsKOGUw14kVdDXcdIkTj7Uv3X/BBQJnXBDhAhsMAAoJEIkTj7Uv3X/B 8S0BAK8H5ngZpjYzVFS3juGnF1QA0cc8K4Bj84c7pBAjzoJ6AQC1e+rrbH9Gm143 7OXjQmTGQLq+BgrHVblNoIAWVrkTAg== =mny6 -----END PGP PUBLIC KEY BLOCK-----

Key ID: 4B0A386530D789157435DC7489138FB52FDD7FC1

GnuPG Command-Line Guide

Essential GnuPG commands for using this key. Replace filenames and email addresses as needed.

Step 1 — Save the key

Copy the block above and save it to a file:

nano public_key.asc
Step 2 — Import the key
gpg --import public_key.asc

List all imported keys:

gpg --list-keys
Step 3 — Encrypt a file
gpg --encrypt --recipient 'A1131' message.txt

Or by email:

gpg -e -r 'nullpointer@mail.i2p' message.txt
Step 4 — Sign a file
gpg --detach-sign document.txt
Step 5 — Decrypt / Verify
gpg --decrypt secret.txt.gpg

Verify a detached signature:

gpg --verify document.txt.sig document.txt
Trust the key (optional)
gpg --edit-key A1131

Then type trust and select level 5.

Technical Details
🔑
Public Key Cryptography
Asymmetric encryption using EdDSA / Curve448 for secure communication.
Digital Signatures
Verify authenticity and integrity of messages and files.
Key Management
Import, export, and manage keys with configurable trust levels.
🔒
End-to-End Encryption
Encrypt with recipient's public key; only their private key can decrypt.
I2P compatible
Use over I2P at nullpoint.i2p for additional network-level privacy.