Sending Sensitive Information
We recommend that you encrypt sensitive information in email to protect it from being viewed by unintended recipients. We prefer OpenPGP standard cryptography, which usually means Pretty Good Privacy (PGP) or the GNU Privacy Guard (GnuPG or GPG). However, can use S/MIME or other methods on a case-by-case basis.
Those unable to use PGP can contact us at <firstname.lastname@example.org> or <+1 412-268-5800> to arrange alternative methods.
We also encourage you to check the PGP signature on email and documents to ensure that they were produced by the CERT key and have not been altered.
Download and Verify the Current CERT/CC PGP Key
As a good security practice, be sure to validate PGP keys you receive and do not trust unvalidated keys. In the past, forged CERT PGP keys have been created and uploaded to public keyservers. It is important to validate your copy of the CERT PGP public key to ensure it is legitimate.
Our current PGP key has the following properties:
CERT PGP Key Information Key ID: 0x591174C3 Key Type: RSA Expires: 2018-09-30 Key Size: 4096 Key Fingerprint: 6664 E6E5 0950 F82F 852B 20ED 69CD F89D 5911 74C3 UserID: CERT Coordination Center <email@example.com>
The CERT PGP keys have an operational life span of approximately one year. When we generate a new key, it will be available from this web page, and we will announce the change.
Call us at +1 412-268-5800 to verify the fingerprint.
Past CERT/CC PGP Keys
Below is a list of previously used keys and the dates the keys ended use. Do not use these keys for encrypting new information, but the keys may be useful for validating old content.