Keytrace is in beta. You likely will need to re-verify your claims when it goes live.

All recipes

PGP Key Verification

How keytrace verifies PGP Key identity claims

Claim URI Format

pgp:https://gist.github.com/alice/abc123def456

Pattern: ^pgp:(https:\/\/.+)$

Create Your Proof

  1. 1Install GPG tools
  2. 2Enter your PGP fingerprint to set up the proof (run gpg --fingerprint to find it)
  3. 3Copy the proof text and save it to a file (e.g. proof.txt)
  4. 4Clearsign the file with your PGP key: gpg --clearsign proof.txt
  5. 5Host the signed output (proof.txt.asc) at a public URL — a GitHub Gist or Tangled String works well
  6. 6Paste the URL below

Proof Text

You need to include this text in your PGP Key proof location:

Verifying my PGP key on keytrace did: did:plc:example123456789012345678 fingerprint: {fingerprint}

Where to put it: Host the clearsigned proof at a public URL (e.g. a GitHub Gist)

Verification Steps

  1. 1

    Fetch proof data

    Using the http fetcher

    https://api.github.com/gists/abc123def456
  2. 2

    Search for DID in response

    The runner checks the following locations for your DID:

    • files.*.contentcontains

      Check if files → * → content contains the DID

  3. 3

    Attestation

    If the DID is found, keytrace signs an attestation linking your identity to your ATProto DID and stores it in your repo.

Try Verification

Test verification with your own claim URI and DID: