This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
blug-canary-1 [2019/09/30 17:37] BLUG Admin |
blug-canary-1 [2025/10/31 11:56] (current) BLUG Admin |
||
|---|---|---|---|
| Line 15: | Line 15: | ||
| ==================================== | ==================================== | ||
| - | Issued for September 2019. | + | Issued for October 2025. |
| Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
| Line 23: | Line 23: | ||
| ~~~~~~~~~~~~~ | ~~~~~~~~~~~~~ | ||
| - | * biergaizi: | + | * biergaizi: |
| - | * persmule : 0x2987A25DAC8454A5 | + | * persmule : 0x7636112A33805777A0646B1BFA7C50B699AC61D2 |
| - | * wnereiz | + | * vimacs |
| THREE DOCUMENTS IN TOTAL. | THREE DOCUMENTS IN TOTAL. | ||
| Line 62: | Line 62: | ||
| 8. Our personal safety and security is not threatened. | 8. Our personal safety and security is not threatened. | ||
| - | 9. To avoid security breaches and emphasize the clarity of the warrent | + | 9. To avoid security breaches and emphasize the clarity of the warrant |
| documents, if a signer is temporarily unavailable, | documents, if a signer is temporarily unavailable, | ||
| " | " | ||
| NOT be considered a valid canary document) until the signer becomes available | NOT be considered a valid canary document) until the signer becomes available | ||
| - | again and signs the missed documents. A new signer SHOULD NOT sign a warrent | + | again and signs the missed documents. A new signer SHOULD NOT sign a warrant |
| canary document only due to the temporary unavailability of a existing signer. | canary document only due to the temporary unavailability of a existing signer. | ||
| 10. We plan to publish the next of these canary statements in the first three | 10. We plan to publish the next of these canary statements in the first three | ||
| - | weeks of October 2019. Special note should be taken if no new canary is published | + | weeks of December 2025. Special note should be taken if no new canary is published |
| by that time or if the list of statements changes without plausible explanation. | by that time or if the list of statements changes without plausible explanation. | ||
| + | |||
| + | 11. Due to the ongoing security issues of OpenPGP keyservers, it makes signature | ||
| + | verification an issue and somewhat a challenge. For completeness, | ||
| + | procedures for canary verification is included here. | ||
| Special Announcements | Special Announcements | ||
| Line 77: | Line 81: | ||
| None. | None. | ||
| + | |||
| + | Canary Verification Procedures | ||
| + | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
| + | |||
| + | 1. To verify biergaizi' | ||
| + | |||
| + | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
| + | https:// | ||
| + | is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. | ||
| + | |||
| + | b. Use the latest GnuPG in any operating system. | ||
| + | |||
| + | 2. To verify persmule' | ||
| + | |||
| + | a. Due to the previous attacks on OpenPGP keyservers, persmule has published | ||
| + | the OpenPGP public key to https:// | ||
| + | the standard method, it's impossible to import a OpenPGP public key without | ||
| + | User-ID. But since April 2013, we have developed a workaround, described | ||
| + | below. | ||
| + | |||
| + | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, | ||
| + | such as https:// | ||
| + | fingerprint is 0x7636112A33805777A0646B1BFA7C50B699AC61D2. Note that, to | ||
| + | import this key, one must copy and paste the key in ASCII from the Keyserver | ||
| + | website to a file or console and use the command "gpg --import" | ||
| + | technical problem, Using "gpg --recv-key" | ||
| + | work. | ||
| + | |||
| + | c. This is a special dummy public key with its User-IDs and subkeys stripped | ||
| + | that we specifically created, leaving only a " | ||
| + | E-mail address, "Kikek < | ||
| + | allowing the subsequent import of additional subkeys. | ||
| + | |||
| + | d. Next, with the stub key already imported, obtain the public key from | ||
| + | https:// | ||
| + | Because the dummy key with its stub User-ID is already in presence, it's | ||
| + | now possible to import the https:// | ||
| + | |||
| + | e. Use the latest GnuPG in most operating system, the signatures made by | ||
| + | persmule' | ||
| + | |||
| + | 3. To verify vimacs' | ||
| + | |||
| + | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
| + | https:// | ||
| + | is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. | ||
| + | |||
| + | b. Use the latest GnuPG in any operating system. | ||
| Proof of Freshness | Proof of Freshness | ||
| Line 82: | Line 134: | ||
| $ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
| - | Al-Shabaab claims twin attacks on US base and EU convoy in Somalia | + | Ukraine: The Latest |
| - | Top City lawyer took advantage of ' | + | Teenagers |
| - | | + | Blizzard traps nearly 1,000 hikers on slopes |
| - | Afghanistan election dispute looms as front-runners both declare victory ahead of results | + | BBC Breakfast boss cleared of bullying allegations |
| - | Prince Harry in Malawi during Africa tour, in pictures | + | |
| $ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
| - | Gems, Warlords and Mercenaries: | + | Xi Delivers Veiled Warning |
| - | Hong Kongs Status as Neutral Ground at Risk as China Asserts Power | + | Ukraine Gamifies the War: 40 Points to Destroy |
| - | | + | |
| - | France Honors Jacques Chirac With a Day of Mourning | + | Executions and Mass Casualties: Videos Show Horror Unfolding |
| - | Xi Extols Chinas Red Heritage | + | |
| $ date -R -u | $ date -R -u | ||
| - | Mon, 30 Sep 2019 17:34:43 +0000 | + | Fri, 31 Oct 2025 11:54:19 +0000 |
| -----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
| - | Version: GnuPG v2 | ||
| - | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAl2SPNEACgkQ+tPrBeiO | + | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAmkEo50ACgkQ+tPrBeiO |
| - | jW3IBw//co+P9zFGAtkTKTKXtp7qxTNuss/ | + | jW2NTw/+NQ+pMcK/6NBH4D+lXa4ovbNKcyPi6+mJm36Jqg7sO835aYMLzGhe0fXv |
| - | /e2YHcH+e8IFhaLQOzeviSRSozb7YfjepSXGeboD96WBJpwn1pDlZ5X2symZJlbD | + | YYG9ySE7/Gi7H4gmFj4US1FJzWI7RgXeJuvwI+G12Qecaa2rO7eun6Xorw0/K/1j |
| - | teTfmm/vtiVW+QgHRnLItibii4aBfbaa7ITWzHrBltKbCJkP+ZGWwCVYULv1pyML | + | UbXfiHwZEBEM7oqPhZfxQWRKN4BUuVlaUgZh14eAbZhy34yP6iUG3zPk65ZDOHvp |
| - | kZ9cRlhII35K2TxXsLNjI3Yoq8dVyoSnrsPaSckknVeoeU2QdWH1nNP6cQ0nVqs8 | + | NP+BCYc2daIzgGiWfW54DljuLgY5l8BQUatgeYddvZ+QcZjLb2D1BuTHwKV9SDKW |
| - | PNVKFuR9RcHRK1b57beT/XfFqwJwE7sUV0FSLdRYRlAkJHH5tQ5/Zu3jnieWf/lA | + | DhwRO3rnmuByaIgcM3mhBKoOwhS+hHxupRD1/KQn+iuilstUF/ |
| - | G2noZmFQCSGoxQ4ccOJEGWWEaxQ1Qp7w6WIUOsubWc2yUeGQTcOAvvKff8DbskGF | + | O22e5TEpIXNpESftl2aUOZeycOJF6aAKCPBVAU3dWsZlXLOnWKyN7KZ+r+pKuTFI |
| - | YoYonEcipAx1pyb1ljMHHK0Dw/9YMzHY+e5cHPN4SCJ94vxoXC53kJ1v+1i5gCHU | + | MDhjMHQVP7eAlM5Bpw/CijOiXKYY0IyHnYjsIlj1A9bBDsJ0NDcET+i4ua6BKSQq |
| - | QnliYVGsYSKuYL2W7/fyDR9DxmLljbjUWoiJWI2hebunFVIPHfkDfL9YgAJMPI6v | + | IoQ5LQPR1JswtjWIenbKDpCEvqQX2l28Al/L2WVpVGK/i/kArBfAhHGJcuUmYU1K |
| - | 6zNiiWm/M/1x2t7weifiOs4u/jhVDQPHi5Bar5BICMLKOd6V96COWTUtgWHRz7nF | + | csGvgxttlDS1jX+30rqrntPJMa+rvLojyhCRPOtsG4FXriftC8b9CK2EHRIxZG2v |
| - | noRF5vwCo+rbgb2AZzWzAcpB4pn7CF4T/wRO05hYHvaIBKkDto9AYlxe7pKJ9zgD | + | 0cbXu4g8mAx/vIpjbC/ |
| - | FyXBmxMLF0nVFKmY6AdirI7FZtuQ36ajLiQk1cP2EC31gEcJ030= | + | pmE8c17pRygVVhOB6o38ur/ |
| - | =Qx/8 | + | =uBfv |
| -----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
| </ | </ | ||