
adamgetchell.org/posts/2016-08-11-public-identity
Preview meta tags from the adamgetchell.org website.
Linked Hostnames
29- 4 links tokeybase.io
- 2 links toadamgetchell.org
- 2 links toprotonmail.com
- 2 links totwitter.com
- 2 links tovimeo.com
- 1 link to1password.com
- 1 link toblog.getpelican.com
- 1 link todmarc.org
Search Engine Appearance
Secure, Verifiable, Public Identity
For awhile, I’ve been interested in establishing a secure, verifiable, public identity. There are any number of reasons to do this, for example, authenticity and non-repudiation, frictionless sharing of files, and so forth. But that’s the topic of another article. What I want to talk about here is how I got to the promised land. First up is Keybase, which is a really awesome software stack that maps your identity to your public keys.
Bing
Secure, Verifiable, Public Identity
For awhile, I’ve been interested in establishing a secure, verifiable, public identity. There are any number of reasons to do this, for example, authenticity and non-repudiation, frictionless sharing of files, and so forth. But that’s the topic of another article. What I want to talk about here is how I got to the promised land. First up is Keybase, which is a really awesome software stack that maps your identity to your public keys.
DuckDuckGo
Secure, Verifiable, Public Identity
For awhile, I’ve been interested in establishing a secure, verifiable, public identity. There are any number of reasons to do this, for example, authenticity and non-repudiation, frictionless sharing of files, and so forth. But that’s the topic of another article. What I want to talk about here is how I got to the promised land. First up is Keybase, which is a really awesome software stack that maps your identity to your public keys.
General Meta Tags
10- titleSecure, Verifiable, Public Identity | Adam's Entropy
- charsetutf-8
- X-UA-CompatibleIE=edge,chrome=1
- viewportwidth=device-width,minimum-scale=1
- descriptionFor awhile, I’ve been interested in establishing a secure, verifiable, public identity. There are any number of reasons to do this, for example, authenticity and non-repudiation, frictionless sharing of files, and so forth. But that’s the topic of another article. What I want to talk about here is how I got to the promised land. First up is Keybase, which is a really awesome software stack that maps your identity to your public keys.
Open Graph Meta Tags
4- og:titleSecure, Verifiable, Public Identity
- og:descriptionFor awhile, I’ve been interested in establishing a secure, verifiable, public identity. There are any number of reasons to do this, for example, authenticity and non-repudiation, frictionless sharing of files, and so forth. But that’s the topic of another article. What I want to talk about here is how I got to the promised land. First up is Keybase, which is a really awesome software stack that maps your identity to your public keys.
- og:typearticle
- og:urlhttps://adamgetchell.org/posts/2016-08-11-public-identity/
Twitter Meta Tags
3- twitter:cardsummary
- twitter:titleSecure, Verifiable, Public Identity
- twitter:descriptionFor awhile, I’ve been interested in establishing a secure, verifiable, public identity. There are any number of reasons to do this, for example, authenticity and non-repudiation, frictionless sharing of files, and so forth. But that’s the topic of another article. What I want to talk about here is how I got to the promised land. First up is Keybase, which is a really awesome software stack that maps your identity to your public keys.
Item Prop Meta Tags
6- nameSecure, Verifiable, Public Identity
- descriptionFor awhile, I’ve been interested in establishing a secure, verifiable, public identity. There are any number of reasons to do this, for example, authenticity and non-repudiation, frictionless sharing of files, and so forth. But that’s the topic of another article. What I want to talk about here is how I got to the promised land. First up is Keybase, which is a really awesome software stack that maps your identity to your public keys.
- datePublished2016-08-12T00:00:00+00:00
- dateModified2016-08-15T00:00:00+00:00
- wordCount1056
Link Tags
1- stylesheet/ananke/css/main.min.css
Links
36- http://blog.getpelican.com
- http://dnssec.net
- http://security.stackexchange.com/questions/6730/what-is-the-difference-between-authenticity-and-non-repudiation
- http://www.dkim.org
- http://www.openspf.org