-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512,SHA1 I am transitioning away from my old OpenPGP key, having set up a new one. The old key will continue to be valid for some time, but all future correspondence should be sent to the new one, which I would like to be integrated in the web of trust. This message is signed by both keys to certify the transition. The old key was: pub 1024D/52D68DF2 2002-11-19 Key fingerprint = B36B 91C5 1835 DB9B FBAB 735B 84C5 E278 52D6 8DF2 and the new key is: pub 2048R/100D63CD 2013-12-29 Key fingerprint = D683 9CA0 A67F 74D9 DFB7 0922 EBD5 95A9 100D 63CD To fetch my new key from a public key server, you can do gpg --keyserver pool.sks-keyservers.net \ --recv-key D6839CA0A67F74D9DFB70922EBD595A9100D63CD and should then be able to verify that the new key is signed by my old one: gpg --check-sigs 100D63CD If you are satisfied that you have the right key, and the UIDs match what you expect, I would appreciate it if you would sign the key: gpg --sign-key 100D63CD and then either e-mail me with the new signatures, or upload the signatures to a public keyserver directly: gpg --keyserver pool.sks-keyservers.net --send-key 100D63CD Thank you, Christophe -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iQEcBAEBCgAGBQJSwJoKAAoJEOvVlakQDWPNYLkH/3Bg4KiUhf3LLkJG2splERhF IGTGK31pBegACme6Gw7620ia6t0B9Cpye6ZSl4VpS/44fom2x6RgHTywPeejz7Rc HMXCcyedT2x1GDo8HZJUzwdE9FYxn33Rldmqohz7AQsUNDsJAmVVxBpHy2t9HOtq A6rHaz+tbi43iFLWI2RdksGj0uTDd/xaZ0hn+1PS51VYDkH8RaGduUw2vh8VCtU+ DRtAVTh+eZq9NbsEkpex3WubiEyRYS+qt253HgK6BlW1+kV1jSQVRsrC0Db4pgv3 UfMCVeGRzMyvHnODALjxJPDU3z/SaZgiR++6uVrlVa3XIqSWC2II04RQDDk8A5SI RgQBEQIABgUCUsCaCgAKCRCExeJ4UtaN8iIlAJ0RDQOIqJB7K3E8EL6pMxbuqDx6 FgCfX0uMze/ZWRyuu9SWKcS/TDBWFAs= =fAC+ -----END PGP SIGNATURE-----