-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 To ensure the image has not been corrupted in transmit or tampered with, perform the following two steps to cryptographically verify image integrity: 1. Verify the authenticity of this file by checking that it is signed with our GPG release key: $ curl https://keybase.io/turnkeylinux/pgp_keys.asc | gpg --import $ gpg --list-keys --with-fingerprint release@turnkeylinux.com pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12] Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D uid Turnkey Linux Release Key $ gpg --verify turnkey-mahara-14.2-jessie-amd64.ova.hash gpg: Signature made using RSA key ID A16EB94D gpg: Good signature from "Turnkey Linux Release Key " For extra credit you can validate the key's authenticity at: https://keybase.io/turnkeylinux 2. Recalculate the image hash and make sure it matches your choice of hash below. $ sha256sum turnkey-mahara-14.2-jessie-amd64.ova e3c3d908a349e220bab88ec1ade16f2b3e37cd9ac1afeb0111d8b807676c345b turnkey-mahara-14.2-jessie-amd64.ova $ sha512sum turnkey-mahara-14.2-jessie-amd64.ova 3a98202079f46035f99dff3914047ca7af3da690edba49d353278bafdf224d08d00b383947403aa7d9de4ed2bda1b6e2100ef34da8dfd2abf8eb1ed280a5c015 turnkey-mahara-14.2-jessie-amd64.ova Note, you can compare hashes automatically:: $ sha256sum -c turnkey-mahara-14.2-jessie-amd64.ova.hash turnkey-mahara-14.2-jessie-amd64.ova: OK $ sha512sum -c turnkey-mahara-14.2-jessie-amd64.ova.hash turnkey-mahara-14.2-jessie-amd64.ova: OK -----BEGIN PGP SIGNATURE----- iQEcBAEBCAAGBQJZeIKkAAoJEIXCXpWhbrlNjVAH/0MBMlJ6dGYTtvq8+CQWfvMv kQqpaJ/tE2H+++9saRmN95ghDNWXVQYyc3oULOWSDHztd6U8bsLT0t38M2uXjE2T 7WrEFN46I7oxzU86Ox9ITWRw2Kcv3FstJFX/T24dUh2jHHAV3SFgDm1yVP2bzD4b qiLZC4QLDa2uXdMNAj8htjWJHKHjLRLeW3FhGpG7lUYaSUHi01nL5cPG8o8zryj7 5UV3bWdNB0pHZs3lL+KoDWxjpSscoFjAsav4SMqeL6U5V4L6YzgHjsEUxD6Ustby DF6oIPq1+T/ruxC10pZBiwgAbJJHmZvIrm1F34Ozmfes2LpNc5ukadcCcL5Uvqk= =e1a5 -----END PGP SIGNATURE-----