This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
blug-canary-2 [2023/02/18 01:09] persmule |
blug-canary-2 [2023/11/15 14:28] persmule |
||
---|---|---|---|
Line 6: | Line 6: | ||
==================================== | ==================================== | ||
- | Issued for February | + | Issued for November |
Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
Line 61: | Line 61: | ||
10. We plan to publish the next of these canary statements in the first three | 10. We plan to publish the next of these canary statements in the first three | ||
- | weeks of March 2023. Special note should be taken if no new canary is published | + | weeks of December |
by that time or if the list of statements changes without plausible explanation. | by that time or if the list of statements changes without plausible explanation. | ||
Line 71: | Line 71: | ||
~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
- | None. | + | 1. We've found a workaround for importing keys on https:// |
+ | without User-ID. The instructions for verifying persmule' | ||
+ | been added. | ||
Canary Verification Procedures | Canary Verification Procedures | ||
Line 86: | Line 88: | ||
2. To verify persmule' | 2. To verify persmule' | ||
- | a. Unfortunately, | + | a. Due to the previous |
- | | + | the OpenPGP |
- | countermeasure, | + | |
- | | + | |
- | it's impossible to import a OpenPGP public key without User-ID | + | |
- | | + | |
- | b. We are looking for a solution. But for now, you should check the | + | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, |
- | | + | such as https:// |
- | | + | |
- | to two people. It reduces | + | |
- | | + | |
+ | technical problem, Using "gpg --recv-key" | ||
+ | | ||
- | c. Once the technical problem of using a public key without | + | c. This is a special dummy public key with its User-IDs and subkeys stripped |
- | | + | that we specifically created, leaving only a " |
- | | + | E-mail address, " |
- | | + | |
- | | + | |
+ | d. Next, with the stub key already imported, obtain the public key from | ||
+ | https:// | ||
+ | | ||
+ | now possible to import the https:// | ||
+ | |||
+ | e. Use the latest GnuPG in most operating system, the signatures made by | ||
+ | | ||
+ | other systems should work just fine, but not Fedora. The subkeys contains | ||
+ | signatures made with Brainpool curves, which are disabled on Fedora due to | ||
+ | potential patent-licensing problems, causing a " | ||
+ | | ||
3. To verify vimacs' | 3. To verify vimacs' | ||
Line 117: | Line 131: | ||
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | University unions call off strikes | + | Two 12-year-olds arrested in connection with Shawn Seesahai murder |
- | Case of British embassy spy David Smith exposes potential vetting failings | + | Tuesday evening news briefing: Braverman' |
- | | + | |
- | How spiders could save the world from crop-eating pests according | + | Chickenpox vaccine to be offered to all babies and toddlers |
- | Porsche crushed by tree as Storm Otto brings 100mph winds | + | |
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Ukraines Allies, Facing | + | Israel-Hamas War: Israeli Military Raids Gaza Hospital, a Key Objective in Its Invasion |
- | How a TinyNATO Nation Tackled a Big Problem: Arming Ukraine | + | What One Photo Shows About a Gaza Hospital in Chaos |
- | Why Did a Turkish City Withstand | + | Lull in Russian Bombing Brings Sleep to Kyiv Residents |
- | A Russian Mole in Germany Sows Suspicions at Home, and Beyond | + | How FIFA Handed Saudi Arabia |
- | Rishi Sunak Pursues Deal on Northern Ireland | + | UK Plan to Send Asylum Seekers to Rwanda Is Unlawful, Supreme Court Says |
$ date -R -u | $ date -R -u | ||
- | Sat, 18 Feb 2023 01:04:57 +0000 | + | Wed, 15 Nov 2023 14:27:36 +0000 |
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
- | iQEzBAEBCgAdFiEEqcx8a+Ec/ | + | iQIzBAEBCgAdFiEEDfvrUpjKhXrxhHZrG+3+G67tLh4FAmVU1WEACgkQG+3+G67t |
- | rFqFKAf/WHCUL7xwG3oAwHPwtJaPAXbWnOf4rVdF5Nd7D6ofPNZaROKWdnGJLhX3 | + | Lh74GxAAu7/33E5rMUTGpWArEI2TngwdsBbEllnFIpURDi4vQqeWe507DJJILhho |
- | hRygS2rZmW+CyMlekmIkL6tV/07INCegYy1KUcjkxIwIiQcAzbBdKE/BHajJqvq5 | + | iU0OaDVb5kep84EQJ+BshX+2jDj19SIa8Q2/IudYz1SbsC/PdB2OWham+wfJDCPA |
- | uFyrxnunLFAsJtO8RutYUeAzfzuQr/uQj/ | + | H3Zsmc9D4/DsugKG5ax6t+OSrEt+1LuuoOageGnPaZBKCMzrwCyrtEGjig81VYXh |
- | 07C9haE2JURyIFHc2J8LtvZwIvW7H2PZQ3/w8CINL6Q09pgbyVArRCC3sSgCq5/7 | + | 45bELHkRdfLhPZvJOzgRN1GKtRfBuFSA8hOtLWiHNHfarPG+Znnw66yT9wu2NQeV |
- | e5kEhh7xnzkO74Sv7jJ4qHb9a2SPZAtk7mRRYlK/6Ab5d5NWqdX96vjbGr7vHj3E | + | Y/8RP5IWyUCJ73w83f4SoElPvcP2yvkAAUcrC3Npw8Dp2BdDsO3UkanDfFt45wrZ |
- | riyWhjXSd/G9Y453W/FabEPiIPN7Dg== | + | UMkJ0EzBCmbOeLY4uFcus2AFa3ojP+EaVAHc21lS/OV4PA7jVxgU1HwhRqndyCLb |
- | =9IZ4 | + | k+lxdH2mPAoZ6ZnFYU+MZZwIDaAuvD2z2qc2RKOny6ZX2PPqXYlParAnqCFAa1FP |
+ | sfm2952b3W3V2RV7FX8bbqCV2xL/5TSzHqYqj1EyhFdaWPdOgPdXjm3RbMYJfBDu | ||
+ | FRxa3KpoJ/8dyWe7HKezlmo2vPgSAHF/x10c9JAlc+MxdgazyvPvUeWf8rVsF1PX | ||
+ | iu1jt1m/ | ||
+ | xvbE4qB3eAuez4Ag/ | ||
+ | =y5H9 | ||
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
</ | </ |