In Q drop 3620, Q suggests that conventional PGP encryption/signin
Q did everyone a favor by revealing that PGP is compromised. It is a standard for email encryption, probably used by millions. Imagine if the Deep State has a back door?
I don't know anything about the algorithm behind "trip codes". Even if Q trusts them, are they open, well-audited and available for general use? I don't know. But I'm familiar with another algorithm for digital signing, Ed25519, from when I worked cyrptocurrencies. It is a popular choice because it is fast and because it is based on academic research led by Daniel J. Bernstein. It is completely open and extensively audited. There is no known instance of a cryptocurrency theft by breaking this algorithm, which surely is a high-incentive target. Importantly, Bernstein was motivated to design a new algorithm because he did not trust government-approved algos like RSA. He even won a court case against the US Government which sought to deny him the right to publish his work.
This begs the question, why didn't Q use Ed25519 DSA instead of "trip codes" which would have allowed him to publish on any platform? I can only guess. But I felt like setting up a simple web page for general use, now that I don't trust PGP anymore, based on a well-audited implementation of Ed25519. It's functional not fancy at this point and is brand new so there may be bugs. https://ed25519-dsa.github.io/
Public key: SqCFJ8wPWrY7dKbZw
The signed message ends just above the public key line. You're welcome to verify the signature yourself.