A Sample GPG Signature

I've mentioned GPG before in the context of being both the best tool for creating cryptographic signatures and for encrypting messages you want to send through a potentially hostile channel. To help show what a GPG signed message looks like I though I'd post an example.1 The signature can be verified with the GPG public key posted here by all interested parties.

Hash: SHA1

If you are a representative of Solar Wind Mining reading this, be
aware that I'm not calling you a scam. I'm saying that your
potentially legitimate venture doesn't even look as good as some
scams, and this situation was entirely preventable.

Originally posted October 7th, 2013
Signed October 9th, 2013
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/


So, I chose this statement to sign, because I am willing to stand behind it. Even if I take down this post anyone who can produce the signed text block can show that this is something that I said. Checking this signed statement against my public key using GPG allows for that. No amount of my later trying to bury this post can hide the fact that it was signed by the private key corresponding to my public key.

This particular piece of text comes from Monday's post on the Solar Wind Mining Company. As of my typing this I can not find any information on measures they have taken to address the problem of known scams working harder to look legitimate than they do, so I have not problem signing that statement for the original post on the subject. I also kind of wanted to highlight that particular statement because it encapsulates everything wrong about how they are approaching this "Bitcoin Business" thing. If you can't put forward the effort to look better than the scams, what hope do you really have. At the moment the only thing the Solar Wind mining venture has pointing towards their sincere effort to deliver on their promise is most scammers work much harder on their presentation, but as people who care to do the mining math point out even a sincere effort probably isn't saving them.2

I summary, we have a GPG signed message. Using the GPG software verifying the message is easy. Even if I take this post down anyone who saved the signed message can demonstrate I signed it.


  1. I'd post a sample encrypted message to, but doing that for every potential reader's public keys would be a bit much.  

  2. Given the counterparty risks related to timely deliver of mining hardware I tend to use rather unflattering parameters in evaluating mining hardware purchases. Math wise I find Solar Wind's promises too unrealistic to state here.  

Leave a Reply

Your email address will not be published. Required fields are marked *