-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 To ensure the image has not been corrupted in transmit or tampered with, perform the following two steps to cryptographically verify image integrity: 1. Verify the authenticity of this file by checking that it is signed with our GPG release key: $ curl https://keybase.io/turnkeylinux/pgp_keys.asc | gpg --import $ gpg --list-keys --with-fingerprint release@turnkeylinux.com pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12] Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D uid Turnkey Linux Release Key $ gpg --verify turnkey-mattermost-15.0-stretch-amd64.ova.hash gpg: Signature made using RSA key ID A16EB94D gpg: Good signature from "Turnkey Linux Release Key " For extra credit you can validate the key's authenticity at: https://keybase.io/turnkeylinux 2. Recalculate the image hash and make sure it matches your choice of hash below. $ sha256sum turnkey-mattermost-15.0-stretch-amd64.ova 5a535b82021ce03c8312d92b527e1441b96bd670157ed308b50e96935ef8441f turnkey-mattermost-15.0-stretch-amd64.ova $ sha512sum turnkey-mattermost-15.0-stretch-amd64.ova 35884196c39237dbaae8336c69d3a484116e0c6fd10e827523d1a977886fe5013b5c4ef888feab9d922768ecd7a0f52c2abe56682de04de382138fa08a701f5f turnkey-mattermost-15.0-stretch-amd64.ova Note, you can compare hashes automatically:: $ sha256sum -c turnkey-mattermost-15.0-stretch-amd64.ova.hash turnkey-mattermost-15.0-stretch-amd64.ova: OK $ sha512sum -c turnkey-mattermost-15.0-stretch-amd64.ova.hash turnkey-mattermost-15.0-stretch-amd64.ova: OK -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEaUz/JnlaKbrge061hcJelaFuuU0FAluM++QACgkQhcJelaFu uU2rkAf+PrcC46IinPJKxXY0oagsudxHMm1X5v0AbUFUwlvWHR3sBjh401o0CMv2 YjwMRAv48q6Gw0/z167WhmgZvKHW2r5RWNh4VTPrCxt37ziFvNUcgFeHF8uOtGJz WCvaZDpwFU1rntXhYPVIQ9yJWZrCHaAMkaPZ8uBnN8W0PxExUa5DR8CLGSrknEOM i/cM+khozEaRCTM45u3gOrcFFs2CS58dxwQrQ99fkTht1DT993zkYzMCej99UFUB /wNkyddwPxg/NzleaQZN0ZmjroNGzwyUa/OJt03F/O99lD8nahB6ohyQx14Q6ogq MLVz7oKBNfN+94awHLm1may08k7JPQ== =/q1W -----END PGP SIGNATURE-----