A Guide to Securing GitHub with GPG Keys

In the modern digital landscape, security and privacy have become paramount concerns for individuals and organizations alike. One effective way to enhance the security of your GitHub repositories is by using GPG (GNU Privacy Guard) keys. In this blog post, we will explore how to utilize GPG keys with GitHub to add an extra layer of protection to your code and sensitive information.

Understanding GPG Keys:

Before we dive into the implementation, let’s briefly understand what GPG keys are. GPG is an open-source implementation of the OpenPGP standard, which provides cryptographic privacy and authentication for data communication. GPG keys consist of a public key and a private key. The public key is shared with others, while the private key is kept securely and never disclosed.

Generating GPG Keys:

To get started with GPG keys, you need to generate a key pair. Follow these steps:

  1. Install GPG: If you haven’t installed GPG, visit the GnuPG website (https://gnupg.org/) and download the appropriate version for your operating system.
  2. Generate a Key Pair: Open a terminal and enter the following command: gpg --full-generate-key. This command will guide you through a series of prompts to configure your key, including selecting key type and size, entering your name and email address, and setting a passphrase for your private key.
  3. Backup Your Keys: After generating your key pair, make sure to back up your private key and passphrase in a secure location. Losing your private key can result in permanent data loss.

Adding Your GPG Key to GitHub:

Now that you have your GPG key pair, it’s time to integrate it with your GitHub account. Follow these steps:

  1. Add Your Public Key to GitHub: Export your public key by running the command gpg --armor --export <KEY_ID>, replacing <KEY_ID> with the identifier of your key. Copy the output and navigate to your GitHub account settings. Under “SSH and GPG keys,” click on “New GPG key” and paste the contents of your public key.
  2. Verify Your Key: GitHub will display a verification message after adding your key. To verify your key, GitHub will send an email to the email address associated with your key. Follow the instructions in the email to complete the verification process.

Signing Commits with Your GPG Key:

Once your GPG key is linked to your GitHub account, you can start signing commits to verify their authenticity. Follow these steps:

  1. Configure Git: Open a terminal and set your GPG signing key in Git using the command: git config --global user.signingkey <KEY_ID>. Replace <KEY_ID> with the identifier of your GPG key.
  2. Sign Commits: When committing changes to a repository, include the -S or --gpg-sign flag to sign your commits with your GPG key. For example, use git commit -S -m "Commit message".

Verifying Signed Commits:

To ensure the integrity of commits, GitHub provides a visual indicator for signed commits. Look for the “Verified” badge next to the commit author’s name on GitHub. You can click on the badge to view the GPG signature and confirm its validity.

Important: Retaining Old GPG Keys on GitHub

When managing GPG keys on GitHub, it is essential to be mindful of the impact of removing old keys. If you remove an old GPG key from your GitHub account, all commits signed with that key will become unverified. This can lead to a loss of trust in the commit history and potentially raise concerns among collaborators.

To ensure the integrity and verification of your commit history, follow these guidelines when dealing with old GPG keys:

  1. Keep Old Keys Active: Instead of removing old GPG keys from your GitHub account, it is recommended to keep them active. By retaining the old keys, you preserve the ability to verify the commits associated with them.
  2. Add New Keys as Additional: When you generate a new GPG key pair, consider adding the new key as an additional key on your GitHub account instead of replacing the existing one. This way, you can continue to sign commits with both the old and new keys, ensuring the verification of commits across your commit history.
  3. Update Commit Signatures: In cases where you transition from an old key to a new key, it is a good practice to update the signatures of your previous commits. By re-signing the old commits with your new GPG key, you restore the verification status and maintain the integrity of your commit history.
  4. Communicate Key Changes: Whenever you make changes to your GPG keys, it is important to communicate these changes to your collaborators. Notify them about the addition of new keys, any key updates, and the rationale behind these changes. This helps ensure that everyone is aware of the key transitions and can trust the commits associated with your repository.

By adhering to these practices, you can maintain the verifiability and trustworthiness of your commit history while managing your GPG keys on GitHub. Remember, transparency and communication play a vital role in fostering a collaborative and secure development environment.

Protect your commit history, build trust with your collaborators, and confidently utilize GPG keys to enhance the security of your GitHub repositories.

Here’s how you can backup GPG keys on both Linux and Windows operating systems:

Backup GPG Keys on Linux:

  1. Open a terminal.
  2. Navigate to the GPG directory by running the following command:
   cd ~/.gnupg/
  1. Identify your keypair files. You should see files with extensions like .sec or .key for secret keys and .pub for public keys.
  2. Create a backup directory to store your keypair files:
   mkdir ~/gpg_backup
  1. Copy the keypair files to the backup directory:
   cp -r ./* ~/gpg_backup/
  1. Encrypt the backup files with a strong passphrase or password. You can use a tool like tar to create an encrypted archive:
   tar -czvf gpg_backup.tar.gz -C ~/gpg_backup/ .
  1. Safely store the encrypted backup file gpg_backup.tar.gz in a secure location.

Backup GPG Keys on Windows:

  1. Open File Explorer.
  2. Navigate to the GPG directory. The default location is usually C:\Users\{your_username}\AppData\Roaming\gnupg\.
  3. Identify your keypair files. Look for files with extensions like .sec or .key for secret keys and .pub for public keys.
  4. Create a backup directory to store your keypair files. Right-click in the desired location, select “New” > “Folder,” and name it, for example, gpg_backup.
  5. Copy the keypair files to the backup directory.
  6. Encrypt the backup directory. You can use a tool like 7-Zip to create an encrypted archive:
  • Right-click on the gpg_backup directory.
  • Select “7-Zip” > “Add to archive.”
  • In the “Archive” section, choose a format (e.g., ZIP) and set a strong password.
  • Click “OK” to create the encrypted backup file.

Safely store the encrypted backup file in a secure location.

By following these steps, you can create backups of your GPG keys on both Linux and Windows systems, ensuring that you have a secure copy of your keys in case of any unforeseen events or data loss. Remember to protect your backup files with strong passwords and store them securely.


In an era where security is of utmost importance, leveraging GPG keys with GitHub adds an extra layer of protection to your codebase. By following the steps outlined in this guide, you can generate GPG keys, link them to your GitHub account, and sign your commits to establish trust and authenticity. Embracing GPG keys as a security measure not only enhances your GitHub

repositories but also fosters a culture of accountability and trust among collaborators.

Remember, GPG keys are just one component of a comprehensive security strategy. It is crucial to combine them with other best practices, such as strong passwords, two-factor authentication, and regular code reviews, to maintain a robust security posture.

By taking proactive steps to secure your GitHub repositories, you can mitigate the risks of unauthorized access, tampering, and impersonation. Embrace the power of GPG keys and protect your valuable code and sensitive information with confidence.

Stay secure, and happy coding!