Now, how does this actually work? Read RFC 4880 to understand what all this means:
$ gpg -v -v < ploni.asc 2>&1 | less
[...interesting stuff...]
# off=354 ctb=b4 tag=13 hlen=2 plen=25
:user ID packet: "bitcointalk.org u=2778290"
# off=381 ctb=88 tag=2 hlen=2 plen=142
:signature packet: algo 22, keyid D50ED7B480AC5F96
version 4, created 1583879873, md5len 0, sigclass 0x13
digest algo 10, begin of digest c0 e3
hashed subpkt 33 len 21 (issuer fpr v4 C79DD6973572969A0C2CFC9BD50ED7B480AC5F96)
hashed subpkt 2 len 4 (sig created 2020-03-10)
[...more interesting stuff...]
His key is a work of art. The primary key, all subkeys, and all self-signatures have a timestamp of the exact second when his forum account was created. He uses a primary key split from subkeys, which can support good security practices (protip: generate and store the primary key on an airgap machine, `man gpg` and look for `--export-secret-subkeys`). I also noticed that he copied my unusual cipher preferences. LOL. I exercised the same attention to detail when I made my own Faketoshi key. Anyway, I think its clear that Ploni has a deep understanding of OpenPGP internals.