Tails developers maintain several OpenPGP key pairs.

Make sure to verify the keys that you download, because there are several fake and maybe malicious Tails keys on the key servers.

For example, if you first authenticate the Tails signing key through the OpenPGP Web of Trust, then you can verify our others keys as they are all certified by the Tails signing key.

Private mailing list key

Purpose

Encryption

This key has an encryption subkey. Please use it to send encrypted emails to our contact address: tails@boum.org.

Policy

The secret key material and its passphrase are stored on the server that runs our encrypted mailing list software and on systems managed by core Tails developers.

This means people other than Tails developers are in a position to use this secret key. Tails developers trust these people enough to rely on them for running our encrypted mailing list, but still: this key pair is managed in a less safe way than our signing key.

Key details

pub   rsa4096 2009-08-14 [SC] [expires: 2023-03-03]
      09F6 BC8F EEC9 D8EE 005D  BAA4 1D29 75ED F93E 735F
uid           [  full  ] Tails developers (Schleuder mailing-list) <tails@boum.org>
uid           [  full  ] Tails list (schleuder list) <tails-owner@boum.org>
uid           [  full  ] Tails list (schleuder list) <tails-request@boum.org>
sub   rsa4096 2009-08-14 [E] [expires: 2023-03-03]
      C394 8FE7 B604 C611 4E29  4DDF D843 C2F5 E893 82EB

How to get the public key?

There are multiple ways to get this OpenPGP public key:

Signing key

Purpose

This key only has the capability to sign and certify: it has no encryption subkey.

Its only purpose is:

  • To sign Tails released images

  • To certify other cryptographic public keys needed for Tails development

Policy

The secret key material will never be stored on an online server or on systems managed by anyone other than Tails core developers.

Primary key

  • Is not owned in a usable format by any single individual. It is split cryptographically using gfshare.

  • Is only used offline, in an air-gapped Tails only communicating with the outside world through:

    • Plugging the Tails flash media in another operating system to install Tails in the first place.

    • Plugging other removable media in the air-gapped Tails to send the public key, secret key stubs, parts of the secret master key, and so on to the outside world.

    • Plugging other removable media in the air-gapped Tails to receive Debian packages, public keys, and so on from the outside world.

  • Expires in less than one year. We will extend its validity as many times as we find reasonable.

  • Has a revocation certificate split amongst different people. See the details of the mechanism.

Signing subkeys

  • Stored on OpenPGP smartcards owned by those who need them. Smartcards ensure that the cryptographic operations are done on the smartcard itself and that the secret cryptographic material is not directly available to the operating system using it.

  • Expiration date: same as the primary key.

Key details

pub   rsa4096/0xDBB802B258ACD84F 2015-01-18 [C] [expires: 2025-01-25]
      Key fingerprint = A490 D0F4 D311 A415 3E2B  B7CA DBB8 02B2 58AC D84F
uid                   [  full  ] Tails developers (offline long-term identity key) <tails@boum.org>
uid                   [  full  ] Tails developers <tails@boum.org>
sub   rsa4096/0xD21DAD38AF281C0B 2017-08-28 [S] [expires: 2025-01-25]
sub   ed25519/0x90B2B4BD7AED235F 2017-08-28 [S] [expires: 2025-01-25]
sub   rsa4096/0x7BFBD2B902EE13D0 2021-10-14 [S] [expires: 2025-01-25]
sub   rsa4096/0xE5DBA2E186D5BAFC 2023-10-03 [S] [expires: 2025-01-25]

How to get the public key?

To get this OpenPGP public key, download it from this website: tails-signing.key.

If you already have Tails signing key but download it again, it can update the list of existing signatures of the key.

User support key

Purpose

Encryption

Policy

The secret key material and its passphrase are stored on the server that runs our encrypted mailing list software and on systems managed by core Tails developers.

Key details

pub   rsa4096 2013-07-24 [SC] [expires: 2024-01-06]
      1F56 EDD3 0741 0480 35DA  C1C5 EC57 B56E F0C4 3132
uid           [  full  ] Tails bug squad <tails-bugs@boum.org>
uid           [  full  ] Tails private user support <tails-support-private@boum.org>
uid           [  full  ] Tails bug squad (schleuder list) <tails-bugs-owner@boum.org>
uid           [  full  ] Tails bug squad (schleuder list) <tails-bugs-request@boum.org>
sub   rsa4096 2013-07-24 [E] [expires: 2024-01-06]
      0012 C228 1573 FE8D 1C24  E350 9D6D 6472 AFC1 AD77

How to get the public key?

There are multiple ways to get this OpenPGP public key:

  • Download it from this website: tails-bugs.key.

  • Fetch it from your favourite keyserver.

Press team key

Purpose

Encryption

Key details

pub   rsa4096/0x457080B5A072CBE3 2014-07-11 [SCEA]
      Key fingerprint = F3CD 9B7B 4BDF 9995 DA22  088E 4570 80B5 A072 CBE3
uid                   [  undef ] Tails press team (schleuder list) <tails-press@boum.org>
uid                   [  undef ] Tails press team (schleuder list) <tails-press-owner@boum.org>
uid                   [  undef ] Tails press team (schleuder list) <tails-press-request@boum.org>
sub   rsa4096/0x5748DE3BC338BFFC 2014-07-11 [SEA]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

  • Download it from this website: tails-press.key.

  • Fetch it from your favourite keyserver.

Board key

Purpose

Encryption

  • Use this key to encrypt private emails sent to the Board.

Key details

pub   rsa4096/0x08344AF2248F2BE0 2022-02-14 [SC]
      Key fingerprint = B5C0 0222 D25F F139 28B2  CB93 0834 4AF2 248F 2BE0
uid                   [ unknown] tails-board@boum.org <tails-board@boum.org>
uid                   [ unknown] tails-board@boum.org <tails-board-owner@boum.org>
uid                   [ unknown] tails-board@boum.org <tails-board-request@boum.org>
sub   rsa4096/0x1817A67B76A21A00 2022-02-14 [E]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

  • Download it from this website: tails-board.key.

  • Fetch it from your favourite keyserver.

Accounting team key

Purpose

Encryption

Key details

pub   rsa4096/0xC436090F4BB47C6F 2014-07-11 [SCEA]
      Key fingerprint = 256D EB90 7788 0CD6 8167  8528 C436 090F 4BB4 7C6F
uid                   [  undef ] Tails accounting team (schleuder list) <tails-accounting@boum.org>
uid                   [  undef ] Tails accounting team (schleuder list) <tails-accounting-owner@boum.org>
uid                   [  undef ] Tails accounting team (schleuder list) <tails-accounting-request@boum.org>
sub   rsa4096/0x289A5B45A9E89475 2014-07-11 [SEA]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

Fundraising team key

Purpose

Encryption

Key details

pub   rsa4096/0xFEB0D5A18EACAF99 2014-08-09 [SCEA]
      Key fingerprint = 3910 BD9D 690B A8C5 692F  93F8 FEB0 D5A1 8EAC AF99
uid                   [ unknown] Tails fundraising team (schleuder list) <tails-fundraising@boum.org>
uid                   [ unknown] Tails fundraising team (schleuder list) <tails-fundraising-owner@boum.org>
uid                   [ unknown] Tails fundraising team (schleuder list) <tails-fundraising-request@boum.org>
sub   rsa4096/0xEDC585308B7A9217 2014-08-09 [SEA]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

Foundations team key

Purpose

Encryption

Key details

pub   rsa4096/0xA827FE0D677E522C 2019-02-24 [SC]
      Key fingerprint = EFC9 4A11 CBF6 F00F 509C  EB0C A827 FE0D 677E 522C
uid                   [ unknown] tails-foundations@boum.org <tails-foundations@boum.org>
uid                   [ unknown] tails-foundations@boum.org <tails-foundations-request@boum.org>
uid                   [ unknown] tails-foundations@boum.org <tails-foundations-owner@boum.org>
sub   rsa4096/0x244F9D7C6DF90D6D 2019-02-24 [E]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

Mirrors team key

Purpose

Encryption

Key details

pub   rsa4096/0xD2EDA621B572DD73 2016-04-29 [SCEA]
      Key fingerprint = 0B08 8E31 D4F8 E59A 3D39  9137 D2ED A621 B572 DD73
uid                   [ unknown] Tails mirror pool managers (schleuder list) <tails-mirrors@boum.org>
uid                   [ unknown] Tails mirror pool managers (schleuder list) <tails-mirrors-request@boum.org>
uid                   [ unknown] Tails mirror pool managers (schleuder list) <tails-mirrors-owner@boum.org>
sub   rsa4096/0x3DCFC1EB1C62C73C 2016-04-29 [SEA]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

  • Download it from this website: tails-mirrors.key.

  • Fetch it from your favourite keyserver.

Sysadmins team key

Purpose

Encryption

Key details

pub   rsa4096/0x70F4F03116525F43 2012-08-23 [SC] [expires: 2024-10-11]
      D113CB6D5131D34BA5F0FE9E70F4F03116525F43
uid                              Tails system administrators <tails-sysadmins@boum.org>
uid                              Tails system administrators (schleuder list) <tails-sysadmins-request@boum.org>
uid                              Tails system administrators (schleuder list) <tails-sysadmins-owner@boum.org>
sub   rsa4096/0x58BA940CCA0A30B4 2012-08-23 [E] [expires: 2024-10-11]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

Translation platform admins team key

Purpose

Encryption

Key details

pub   rsa4096/0x0190E73C38F13068 2020-10-02 [SC]
      Key fingerprint = 6AA6 4D2B 7D77 AD46 6667  E7BD 0190 E73C 38F1 3068
uid                      tails-weblate@boum.org <tails-weblate@boum.org>
uid                      tails-weblate@boum.org <tails-weblate-request@boum.org>
uid                      tails-weblate@boum.org <tails-weblate-owner@boum.org>
sub   rsa4096/0x2F7EC378C628BE30 2020-10-02 [E]

How to get the public key?

There are multiple ways to get this OpenPGP public key:

  • Download it from this website: tails-weblate.key.

  • Fetch it from your favourite keyserver.