I am open to training. How can I be more clearly sociopathic? I will pay use robots to gangstalk people and then sentiment analysis to identify what upsets them personally. I'll use chatbots to befriend and seed conditioning material, and then follow with repeated association trauma. What am I leaving on the table?
@Doll@f0x@f0x@IAMAL_PHARIUS@bronzeagetruecel@Hyperhidrosis I wanna punch that fucking binturong right in the face holy fuck it has such a punchable face just absolutely starch that fucking thing punch facepunch that thing he sleep thank you for reading my blogtoot.
@lain I just make both at home. Fast food burgers are bad, seemingly almost intentionally. Exceptions for the buffalo ranch up the road, they make nice burgers. (Don't eat pizza too often.)
I can take this file and verify the signature: $ gpg --verify signed_example.txt.asc gpg: Signature made Mon 19 Aug 2024 02:46:04 PM MDT gpg: using RSA key 87A4349F7E1B6B981335FE69EEC8503590D39F90 gpg: Good signature from "m0th@pl.absolutelyproprietary.org <m0th@pl.absolutelyproprietary.org>" [ultimate]
The fingerprint is the last derivative part, it's just a quick way to specify which key you're talking about in a slightly more human readable format. You would still need Crunk's full public key, posted above, and once you have it you could reference it by fingerprint.
You could put "D9E72FDAE14995FAC2BF6F1C1B4F343AE0612080" on your profile if you wanted, but I don't understand what you hope to achieve with that.
If someone took that fingerprint and fetched the associated key the encrypted result would only be readable by Crunk's private key, which isn't shared.