[Edit:
Archived.]
Proof that I can still sign with my key:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
2020-01-03: I am nullius.
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQSNOMR84IlYpr/EF5vEJ5MVn575SQUCXg/T3QAKCRDEJ5MVn575
SdJkAP4z0j0bAGimZrglGP0TgxRY68qYUJkJHCtrMeI65WiVHAD/VNAEr4E34ecx
J8NnMmZ0y9wzEgSWf+z98NJ1EGooXwQ=
=a60O
-----END PGP SIGNATURE-----
My below modification of subkeys/userids proves that I still control the certification-only primary key. I have mentioned before somewhere, the primary key is exclusively kept on an airgap machine. (man gpg, look for --export-secret-subkeys)
I dislike distributing my key this way, especially since I intend to soon do more key maintenance. However, with the keyserver network permanently b0rked, this seems to be the best available means for me to distribute to the forum all of my userids (including those with no mail), revocations of userids for mailboxes that no longer exist, and so forth. The most useful parts of the key are on keys.openpgp.org, as linked in my signature.
Here is my refreshed key with some userids revoked, and a new expiration for the encryption subkey:
-----BEGIN PGP PUBLIC KEY BLOCK-----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=Xmf+
-----END PGP PUBLIC KEY BLOCK-----
Verified.
gpg: Signature made Sat 04 Jan 2020 12:53:01 AM CET
gpg: using EDDSA key 8D38C47CE08958A6BFC4179BC42793159F9EF949
gpg: Good signature from "Nullius <***********************>" [full]
gpg: aka "nullius <***********************>" [full]
gpg: aka "Bitcoin Forum uid 976210 (https://bitcointalk.org/)" [full]
Public key details: created March 21st 2017. No reference to public key in this thread, keep reading.
User profile registration date:
March 29, 2017. Looks about right, let's find out.
pub ed25519 2017-03-21 [C]
C2E91CD74A4C57A105F6C21B5A00591B2F307E0C
uid [ full ] Nullius <***********************>
uid [ full ] nullius <***********************>
uid [ full ] Bitcoin Forum uid 976210 (https://bitcointalk.org/)
sub ed25519 2017-03-21 [S]
sub cv25519 2017-03-29 [E] [expires: 2020-03-29]
List of nullius' subkeys and revokes, first key generated with email currently listed in profile.
pub ed25519/5A00591B2F307E0C
created: 2017-03-21 expires: never usage: C
sub ed25519/C42793159F9EF949
created: 2017-03-21 expires: never usage: S
sub cv25519/74F2272235988F48
created: 2017-03-29 expires: 2020-03-29 usage: E
sub ed25519/E4CBD59703D3444C
created: 2017-03-29 expired: 2019-03-29 usage: A
[ full ] (1). Nullius
[ revoked] (2) Nullius (TLS-enforced mail; use this!) <***********************>
[ revoked] (3) Nullius <***********************>
[ full ] (4) nullius <***********************>
[ full ] (5) Bitcoin Forum uid 976210 (https://bitcointalk.org/)
PGP signed message from December 2017 using unreferenced key (
archived):
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Date: 2017-12-01
Bitcointalk.org login: nullius (976210)
Bitcoin address: 36finjay27E5XPDtSdLEsPR1RypfhNW8D8
E-mail: [email protected]
PGP fingerprints:
* Ed25519: 0xC2E91CD74A4C57A105F6C21B5A00591B2F307E0C
* RSA: 0xA232750664CC39D61CE5D61536EBB4AB699A10EE
I declare that my aforestated PGP Ed25519 Certification key is
the peremptory trust anchor for my online identity at this time,
and unless/until that key signs a statement declaring otherwise.
Unless this statement be revoked or modified by a statement bearing
authentication rooted in that key, I declare that aforestated Bitcoin
address may issue signatures controlling the aforestated Bitcointalk
account.
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQSNOMR84IlYpr/EF5vEJ5MVn575SQUCWiHpvgAKCRDEJ5MVn575
SXTBAP0VUpfJ+gSzqv9vZlT1lKn0BeAhNEDuQqlh78bWSD2apwD/ab23Gb5nnOKX
mdiEIsMEUZ7DbhdScTgos6Jzl9NgGAo=
=7yj+
-----END PGP SIGNATURE-----
Please verify and quote!
Verified with same public key. Summary: all checks out.
Archived.
gpg: Signature made Sat 02 Dec 2017 12:46:06 AM CET
gpg: using EDDSA key 8D38C47CE08958A6BFC4179BC42793159F9EF949
gpg: Good signature from "Nullius <***********************>" [full]
gpg: aka "nullius <***********************>" [full]
gpg: aka "Bitcoin Forum uid 976210 (https://bitcointalk.org/)" [full]
Despite no PGP key referenced earlier in this thread, a previously signed message in 2017 using the same key is more than enough to verify the user:
gpg: Signature made Sat 04 Jan 2020 12:53:01 AM CET
gpg: using EDDSA key 8D38C47CE08958A6BFC4179BC42793159F9EF949
gpg: Good signature from "Nullius <***********************>" [full]
gpg: aka "nullius <***********************>" [full]
gpg: aka "Bitcoin Forum uid 976210 (https://bitcointalk.org/)" [full]
The only inaccuracy is that nullius signed proof in 2017 a day later than speicfied
* email address removedNeutral trust left confirming this proof of ownership:
This user is still in control of their account after a period of absence as verified with PGP. Proof has been signed and verified with a 2017 public key that was used to sign a message the same year. Negative trust concerning this "issue" of absence should therefore be completely ignored, due to the concrete cryptographic evidence presented in reference*.
*Trust amended due to negative trust now removed.