Use the method described here if you would like most of the following benefits:
- Establish provenance of exactly one public key on the Internet over time (years typically).
- Use multiple keys daily without exposing the secret key corresponding to your published public key.
- Facilitate key creation and revocation.
While provenance isn't necessary for many folks, it's useful if not essential if you publish software artifacts