March 13, 2013 18:40

Security is a primary concern in everything we do here at sticky.io, so we strongly urge you to encrypt sensitive information to protect it from being accessed and viewed by unintended recipients. If you have any questions or concerns, please contact us at support@sticky.io.

PGP

To the best of publicly available information, there is no known method which will allow a person or group to break PGP encryption by cryptographic or computational means. You can encrypt sensitive data such as credit card information using sticky.io's PGP Import Key, located below, before sending it to sticky.io. For more information on PGP and GPG, please take a moment to visit http://gnupg.org

After importing (http://www.gnupg.org/gph/en/manual.html#AEN84) our PGP key, you can encrypt your files for sending to us by running gpg --encrypt --recipient support@sticky.io FILENAME. This will create FILENAME.gpg.

Key ID: D45B4B2D

Key type: RSA

Key size: 4096

Fingerprint: 9A1F D098 4FD8 24B8 0D7E 7385 9A1C 26B1 D45B 4B2D

User ID: support@sticky.io

-----BEGIN PGP PUBLIC KEY BLOCK-----

Version: GnuPG v1.4.5 (GNU/Linux)

mQINBFFA7xkBEADIy7F4v/7qV2DI0uOzB7tN/ibwMqoGQtYVCXGY61XauzA3U5yR

M2YlMj1Dz3aWansv9YAHv1RupZi7bFcZNafhwufw0/D5QKpJndbQbYB04+yEv2+s

B0Wk+rhlqfvA9T66gPt9qibN9u2jTRpuUUkDsvR04bPFW8/M7Ws0Q668/05vcRmt

WelWnSEmsvj2/wpmSZwUaKL4sbUutRFj+sR3meGgVGTDEfZGwLh+7pFXteSdDzT/

v2KONmru+Ry8yLAyZHBW6HufW2wp/e7bQMzXoHXlTdJeuCsrQUpRLwox4QxeYPpD

C4LseWRiSlJAh/h4KHZbuaenbQxnqkJh/AL8Kkxc3Cp8nglBrGAEPtA5qP9IIpHs

IyQsuFI5Ny64MmtIOyjibPzydRE23e4A1mwTMeGG87fBxOCRV8/UQQb9nnPkvCJ8

JZYR3rVBhaW32y5YCV8w5u9bnXhIoVgZL3WrMhrSO5gSK3aAxy23ucjTDdUP+n6G

qe4kSVx2QV8idOO43hcKgyXyIzEATXjZN5xtEDBokJcylLyLCqOoeB9ttqnH98bw

c8Coz8A0lHpAchKwAf4TmDGGrUgPW5sE9BJLtjUjZVycj+2b0jgab7jVpmhiIXLb

zYo0s1cbYLfnwimWDaRSJg3fS5bzsMzNimx9ph3k4kE8izMI9uVEQhUjXQARAQAB

tCxMaW1lTGlnaHQgU3VwcG9ydCA8c3VwcG9ydEBsaW1lbGlnaHRjcm0uY29tPokC

NgQTAQIAIAUCUUDvGQIbDwYLCQgHAwIEFQIIAwQWAgMBAh4BAheAAAoJEJocJrHU

W0stg+sP/0lZ1Uc677OX3OEZuFAZVWtPr/L1qqStXeTrWIsnOJ0waBGmuw4lwaAn

3/RqR6Msy4cssnEn1I7qYKYyCJKXBGUICfPo+IRf2Z+VY8smRWCtagWeyBJkSZAI

kEhgiB6U22ZjYU5kNPcsrmuACl90K6cbMcYdz/hAwigFHzZ4cI7XGMX62IV1BF58

aBrfaSGD3WdOECOg5GExRDlZ2fA+yjc/mdVUkn1q3vUuIPx+w5ACgjgK+r/bPgfw

SBtR8GWIq2CqTEebr5e+Hpq96QLHCX930ERwb1eicBq9VzA7DG7Ak/3uSULrq1wb

K+ptTVWzhBeVlWKp/yatj7JKWuhcOS5wab+PPAot6ClUojf3oiP5uME6AwoTUQnN

aUJ0SsKInbmipWD5s5uMMFfviT8SDdPWAeaBZgFU2ucw8MH9YTxqgddfy0KufaVo

5JUABoZd8ppYGIIpdZo9//3EwIzEZHSflBUXTW/j0UNv/64mA8YjvEIawWcnre/t

Aaal1vV1KLundjNFDkPFn+exTGqN6KXrtgE+n5Sk33MMqtVszYpa6QF933BN+X/t

Q2GbRHYbFSdeT1nJyyENEAvu/fUy/iPhIef4JdWh9kiexfk03J1O2lxCNoj5DwuQ

R2j9g7Ti4zLY+Ube2tPimwo1piwdofkkSQv9alLluY69S8bUUcRL

=/EMv

-----END PGP PUBLIC KEY BLOCK-----
Did this answer your question?