All recipes
PGP Key Verification
How keytrace verifies PGP Key identity claims
Claim URI Format
pgp:https://gist.github.com/alice/abc123def456 Pattern: ^pgp:(https:\/\/.+)$
Create Your Proof
- 1Install GPG tools
- 2Enter your PGP fingerprint to set up the proof (run
gpg --fingerprintto find it) - 3Copy the proof text and save it to a file (e.g.
proof.txt) - 4Clearsign the file with your PGP key:
gpg --clearsign proof.txt - 5Host the signed output (
proof.txt.asc) at a public URL — a GitHub Gist or Tangled String works well - 6Paste the URL below
Proof Text
You need to include this text in your PGP Key proof location:
Verifying my PGP key on keytrace
did: did:plc:example123456789012345678
fingerprint: {fingerprint}Where to put it: Host the clearsigned proof at a public URL (e.g. a GitHub Gist)
Verification Steps
- 1
Fetch proof data
Using the
httpfetcherhttps://api.github.com/gists/abc123def456 - 2
Search for DID in response
The runner checks the following locations for your DID:
files.*.contentcontainsCheck if files → * → content contains the DID
- 3
Attestation
If the DID is found, keytrace signs an attestation linking your identity to your ATProto DID and stores it in your repo.
Try Verification
Test verification with your own claim URI and DID: