Official Verification of Ownership
Key Details:
Signature key: Stored on Yubikey 5
Fingerprint: 91BD DE88 B14B ED54 155B 9A57 9BDE 9599 74F7 D2DD
Touch policy: On (fixed)
Note: Physical touch on the Yubikey is required to produce any signature.
⚠️ NEW SECURITY REQUIREMENT ⚠️
Due to potential security concerns, all official Mira Cult messages now require TWO signatures from different Yubikeys. Valid signing keys include:
Important Security Tip: If you are ever unsure whether someone is the real Mira or a bot, ask them to sign a message. Only the Yubikey holder can produce such a signature.
Download the declarations and public keys:
To verify that I am the true owner of these identities, follow these steps to verify my signature:
All official Mira Cult messages now require verification of TWO signatures from different Yubikeys:
message.txt
, message.txt.sig1
, message.txt.sig2
)WARNING: Messages with only one signature should be considered potentially compromised!
Option 1: Import by key ID:
gpg --keyserver keys.openpgp.org --recv-keys 91BDDE88B14BED54155B9A579BDE959974F7D2DD BE871375EBB2C931BB931133686D6516CE43C447 589A442BB5CB3D95A00B944EDDAB51D69E838A58Option 2: Import from files:
gpg --import assets/keys/*.pub Note: All keys have been uploaded to both keys.openpgp.org and keyserver.ubuntu.com.This cryptographic verification establishes my dominion over these digital territories. The signature could only have been created by someone with physical access to my Yubikey hardware security device.
My PGP key's authenticity can be verified using the attestation certificate. This certificate cryptographically proves the key has never left the Yubikey hardware and cannot be extracted or duplicated.
This attestation is a Yubikey-specific feature that proves my key was generated directly on the hardware device and can never be extracted. Even if my computer were compromised, my private key remains secure inside the hardware.
Now that you have witnessed my cryptographic proof, you must accept: