Home
Title
Beside each of the PDF/EPUB links you will see a link button with a lock symbol. The files linked to are digital signatures of the respective book file.

What must you do with these? Nothing. The book files are not encripted, you can download and use them freely under the Creative Commons license cited. You need never obtain any digital signature files or pay them any attention whatsoever

What can you do with digital signature files? To be honest, I can't think of a strong use case for them. The idea is that they are proof of my authorship, and that the signed file is 'as shipped', byte for byte. How this works is as follows.

However what has never been clear to me is why a bad actor would not simply falsify the whole shooting match — target files, DS files, public/private key pair, web pages, everything. But for what it is worth, I made these digital signatures, which you can download via the 'lock' buttons, and decrypt using my public key.

Why didn't I embed each certificate in its subject file? This seemed such a mess to me — import this, convert that. Since GnuPG is available on several platforms, the simplest approach was just to use it. File, certificate, there you go.

I give instructions below for using GnuPG to verify any file for Linux and Windows.

For Linux

For Windows

The GnuPG API you will need for this platform is called Gpg4win. If you want a pretty detailed description of how to use this I recommend CryptoDad's YouTube video on the topic. I'm just going to skim over it here.

Ok so you are going to want to step through the following procedure.

After you verify, you'll see a window open up that looks like this.

Verify_Good

Oh no! Looks like the signature is no good!

No. This is the same issue as gave you the warning if you use Linux. See again this page in the GnuPG Manual. Actually, the signature is ok. I really don't think we need to get into levels of trust and so forth. It's just a book, not a pass to get you into Fort Knox.

If the signature really was bad, you'd see this:

Verify_Bad

Note that you can also do all of this with identical commands to Linux if you use Window's command-line utility.

Oh, by the way, that email address: I don't use it. It's spurious. I just needed an address to set up my PGP keys.