If you have no idea about what GnuPG is about, then the short answer is that has to do with encryption and trust. Encryption to keep prying eyes from seeing what I wish only you to see, or you only want me to see, and trust in the fact that the message you received really did come from me, and vice versa.

If you still don't understand what all this is about, you have two choices really: you could either slowly back out of here, careful not to expose your back to this beast, or you could let your curiosity get the better of you, and start reading the documentation.

Public key

You can download the key directly or from most keyservers.

The fingerprint for the key is:

pub   1024D/86F59A62 2010-07-29
Key fingerprint = F11C 0E6D 7AB3 768C 06DF  E7A8 CE63 8ABE 86F5 9A62

Key signing policy

I cannot for the life of me imagine a scenario ending in me signing a key without having first verified, with confidence, the identity of the key owner, and until such an occasion transpire, at which time I will have to update this policy, I simply won't sign any key, using certification levels 0x10 and 0x11.

I don't sign keys that doesn't include an e-mail address.

After signing a key, an encrypted copy of the signed key will be sent to the owner.

To get me to certify your key with a 0x12 signature, I require:

  1. that the fingerprint of the key is identical to that claimed by the owner, and
  2. that I have gotten the fingerprint validated by its owner in person, and
  3. that the owner identify herself using a state-issued photo ID

For a 0x13 signature, see the requirements for 0x12, and additionally:

  1. that the owner can provide proof of ownership of the specified e-mail, and
  2. that a passport (or similarly difficult-to-forge) identity document is used as a means of identification