-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 To ensure the image has not been corrupted in transmit or tampered with, perform the following two steps to cryptographically verify image integrity: 1. Verify the authenticity of this file by checking that it is signed with our GPG release key: $ curl https://keybase.io/turnkeylinux/pgp_keys.asc | gpg --import $ gpg --list-keys --with-fingerprint release@turnkeylinux.com pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12] Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D uid Turnkey Linux Release Key $ gpg --verify turnkey-icescrum-14.2-jessie-amd64-vmdk.zip.hash gpg: Signature made using RSA key ID A16EB94D gpg: Good signature from "Turnkey Linux Release Key " For extra credit you can validate the key's authenticity at: https://keybase.io/turnkeylinux 2. Recalculate the image hash and make sure it matches your choice of hash below. $ sha256sum turnkey-icescrum-14.2-jessie-amd64-vmdk.zip f9221a0bf48f9b3fb1d2debbc44b805dfd8be96d515c3c211e1d4647311ded78 turnkey-icescrum-14.2-jessie-amd64-vmdk.zip $ sha512sum turnkey-icescrum-14.2-jessie-amd64-vmdk.zip 75a235e01ba154acdfd2803b01d3d74435399731a5efba6449ed2d04f3b5404ad1122be7544d02fafe7affe366b9c95bd94354dc9735501d96998a4a2a177103 turnkey-icescrum-14.2-jessie-amd64-vmdk.zip Note, you can compare hashes automatically:: $ sha256sum -c turnkey-icescrum-14.2-jessie-amd64-vmdk.zip.hash turnkey-icescrum-14.2-jessie-amd64-vmdk.zip: OK $ sha512sum -c turnkey-icescrum-14.2-jessie-amd64-vmdk.zip.hash turnkey-icescrum-14.2-jessie-amd64-vmdk.zip: OK -----BEGIN PGP SIGNATURE----- iQEcBAEBCAAGBQJZfb15AAoJEIXCXpWhbrlNpgoIAN3ctLM9IdjtPobDOfW2HIkK PVAuNn0IbUUnhw8HW8hOcaNErvApeVc3iEPkNYyTKROiU7f0Rrq8kTmJDt45d7EI phl2he0VpAL7ciGlbjjX2ZIyU3spDfD8g3YHMw2N92BLsYxUxu2Yur5SZF10uovr tuEdQMLO8ErCUdD3C3Q2JZmKXK3FT43bPng4yUhvw6xOZOyE2M4bkVLwxEt+hxC5 6k5D741J3K/SVpzkuJWPpJzAVFSfSmfELH68UlZ+16BAbDJUXv7h6AIzI2YCRzxg UgUzod793etsNaXCsmnofdjBYJSAIMRE82AZczsLiWu6+I4A4Ho5oy2ofe3PvHg= =6haS -----END PGP SIGNATURE-----