-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 To ensure the image has not been corrupted in transmit or tampered with, perform the following two steps to cryptographically verify image integrity: 1. Verify the authenticity of this file by checking that it is signed with our GPG release key: $ curl https://keybase.io/turnkeylinux/pgp_keys.asc | gpg --import $ gpg --list-keys --with-fingerprint release@turnkeylinux.com pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12] Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D uid Turnkey Linux Release Key $ gpg --verify turnkey-observium-15.0-stretch-amd64.ova.hash gpg: Signature made using RSA key ID A16EB94D gpg: Good signature from "Turnkey Linux Release Key " For extra credit you can validate the key's authenticity at: https://keybase.io/turnkeylinux 2. Recalculate the image hash and make sure it matches your choice of hash below. $ sha256sum turnkey-observium-15.0-stretch-amd64.ova 50ce5ae51b564bd602fc0a494da23659c20a5f684c201cd7a5f1c986f3098c94 turnkey-observium-15.0-stretch-amd64.ova $ sha512sum turnkey-observium-15.0-stretch-amd64.ova 278b237b8a9f2e43830a01eac1d2961a493b58ebd40512cea81cdd6ae0172650fda4051f54a38a2f35526df4d7bfacf5306867b34d3f6818167f4954f680deae turnkey-observium-15.0-stretch-amd64.ova Note, you can compare hashes automatically:: $ sha256sum -c turnkey-observium-15.0-stretch-amd64.ova.hash turnkey-observium-15.0-stretch-amd64.ova: OK $ sha512sum -c turnkey-observium-15.0-stretch-amd64.ova.hash turnkey-observium-15.0-stretch-amd64.ova: OK -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEaUz/JnlaKbrge061hcJelaFuuU0FAlte12sACgkQhcJelaFu uU3V5ggAgMdd1sTcvZMQWl8wUSfs/Mu42zgM4/NpQ2+rtPhzho2+7jy1QquiZfba g/H/cd7TQo3MGjMceMNmXBCsSp/YudIBl7WOebdlRhWPl8JSUlI7e4TSygCIjmno ZLlMXaT2gkewqy0JbcugcQyWZvQtPDYSacy0McwjtLaW+mEHl5ZB1pXIm4OKjcu9 lPZUebuZuy4+sQCNQbOx8yNMi8eOLU9RTQh5u1IyHY97k1OQwWtenrqDtMTIEyg8 1+mcZwSgVodAr5vv/iGsac8QDJOysFVPbd3sdukB/l0tQiAEfJKM8m2SejFZaBj/ dVReIsMo4+iPhAYgo34X2Qw21Nzq+Q== =UlN2 -----END PGP SIGNATURE-----