Tor Browser Signing key.asc
- Type:
- Other > Other
- Files:
- 1
- Size:
- 4.92 KiB (5040 Bytes)
- Uploaded:
- 2020-06-19 12:26 GMT
- By:
- forbiddenhabits
- Seeders:
- 2
- Leechers:
- 1
- Info Hash: ED5EBBF0399AAAAC9F7DF163ABB29A39B9EEB2EB
This is Tor Browsers signing key without any signatures. Signatures have bees stripped due the key poisoning attacks. However you can verify this keys fingerprint against the fingerprint of Tor Browser Developers public key on the keyservers to be sure. I try to update these keys frequently here, because even if they are the same key, they may change the expiration date. This time I don't include my own signature, because it's not useful. Note that you may strip Tor's pub-key yourself, but it can take a long time to do so. It is advised to first copy the whole poisoned key from the keyservers manually into a text file, because the size of that file may be tens of megabytes. However here is how you can do it with gpg after copying it: gpg --import --import-options import-clean /key/path/key.txt And straight from keyservers: -gpg --search-keys --import-options import-clean EF6E286DDA85EA2A4BA7DE684E2C6E8793298290 And then you sit down and wait for as long as it takes. Note that clean import doesn't work with Kleopatra. You simply would get it more easily if you just take advantage of other people doing it for you but of course then you would have to trust strangers wouldn't you? Key: Tor Browser Signing key.asc (Developer's key) public Fingerprint: EF6E286DDA85EA2A4BA7DE684E2C6E8793298290 RSA: 4096-bit Expires: pub 2020-08-24, sub 2020-09-12 Signatures: Selfsigned Size: 5 040 bytes Safe browsing And remember: Never trust anyone blindly