mini-HOWTO

1. Create a keypair

   $ signify -G -p key.pub -s key.sec -c "my first key"

2. Create a stand-alone (or "detached") signature

   $ signify -S -s key.sec -m file.txt

3. Create a combined signature (message embedded after sig)

   $ signify -S -e -s key.sec -m file.txt

4. Verify a signature

   $ signify -V -p key.pub -m file.txt

5. Verify a signed sha256 digest list*

   $ sha256sum --tag linux-signify.tar.bz2 > SHA256SUMS
   $ signify -S -e -s key.sec -m SHA256SUMS
   $ signify -C -p key.pub -x SHA256SUMS.sig

   * signify expects a BSD-style digest list which can be created on
     Linux using the "--tag" flag of sha256sum(1) (from coreutils)

6. Inspect a key and print its 64-bit base64-encoded fingerprint

   $ signify -I -p key.pub
   $ signify -I -s key.sec

7. Add or change a passphrase on a secret key (requires passphrase patch)

   $ signify -P -s key.sec

8. Remove a passphrase on a secret key (requires passphrase patch)

   $ signify -P -n -s key.sec

For more information, refer to the manpage.

--mancha 20140902