Receive distributed validator keyshares
GPG Key Exchange
This Public key cryptography process is used to transfer the distributed validator keyshares from Ether.Fi to participating node operators securely.
Overview of steps
Receive EtherFi GPG public key from the programme coordinator
Generate your own GPG public-private key pair and the public key fingerprint
Export your GPG public key and send it to the programme coordinator via Telegram or Discord
Export your GPG fingerprint and send it to the programme coordinator via email
Receive EtherFi GPG fingerprint from the programme coordinator via email
Import EtherFi GPG public key into your GPG keyring and verify the fingerprint with the one you received via email
Decrypt the encrypted keyshare files after you receive them from EtherFi
Receive EtherFi public key
You will receive this .asc
file from EtherFi's programme coordinator via Telegram or Discord after you have been onboarded onto a testnet or mainnet cohort.
Generate your own GPG key pair
Choose the key type (e.g., RSA and RSA).
Set the key size (e.g., 4096 bits for high security).
Define the expiration date (or set it to never expire).
Provide your name and email address when prompted.
Set a secure passphrase to protect the private key.
Export your GPG public key
This creates an ASCII-armored file called
my-public-key.asc
.Copy the contents of this file and send it to the EtherFi coordinator in the Telegram or Discord chat.
Export your GPG fingerprint
You’ll see the fingerprint printed as a series of hex digits.
Copy this fingerprint and email it to the EtherFi programme coordinator
Receive EtherFi GPG fingerprint
You will then receive the EtherFi GPG fingerprint as an email response.
Import EtherFi GPG public key & verify fingerprint
Import EtherFi GPG public key into your GPG keyring
Verify the fingerprint using the email sent to you
Decrypt encrypted keyshare files
After receiving the encrypted keyshare files from EtherFi, move them into the same machine that you generated your GPG key pairs in and decrypt them.
Last updated