FIxed links to support markdown, post link changed to relative

This commit is contained in:
doctor_dev 2025-05-22 15:08:21 +00:00
parent 1ffc4cdbf7
commit 16a04f1bd8
No known key found for this signature in database
GPG key ID: F12F7F71CB84AEAA
2 changed files with 5 additions and 5 deletions

View file

@ -190,4 +190,4 @@ Then we can click the "save" icon to save the image somewhere:
![](7.png) ![](7.png)
More about file and software verification can be found in this <a href='http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/file-verification/'>post</a> More about file and software verification can be found in this [post](../file-verification/index.md)

View file

@ -32,7 +32,7 @@ This can be done using a tool named <b>shasum</b>.
For this example i will download <b>flameshot</b> and verify its hash. For this example i will download <b>flameshot</b> and verify its hash.
When going into <a href= https://github.com/flameshot-org/flameshot/releases>flameshot's github</a> repository you can find pair of files, each pair is devised of: When going into [flameshot's github](https://github.com/flameshot-org/flameshot/releases) repository you can find pair of files, each pair is devised of:
1. software files containing the software you want to download in this case its flameshot and the other. 1. software files containing the software you want to download in this case its flameshot and the other.
@ -101,7 +101,7 @@ I will be using Kleopatra(GUI) and gpg(CLI) and will demonstrate on Monero.
5. Now you should be prompted with the passphrase, enter a good password you will need it each time you will use the pgp key. 5. Now you should be prompted with the passphrase, enter a good password you will need it each time you will use the pgp key.
6. Take the public key of monero creator/main dev 6. Take the public key of monero creator/main dev
(<a href='https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc'>Binaryfate.asc</a> - monero creator pgp key) ([Binaryfate.asc](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc) - monero creator pgp key)
7. Download the public key or create a text file put the key inside and change the file extension to .asc (in my case binaryfate.asc) 7. Download the public key or create a text file put the key inside and change the file extension to .asc (in my case binaryfate.asc)
@ -124,7 +124,7 @@ I will be using Kleopatra(GUI) and gpg(CLI) and will demonstrate on Monero.
12. Now press certify and enter the passphrase for the specific pgp key that signs/certifies the new public key. 12. Now press certify and enter the passphrase for the specific pgp key that signs/certifies the new public key.
13. Last but not least part of the authenticity, verifying the origin of the sha256sums. 13. Last but not least part of the authenticity, verifying the origin of the sha256sums.
for this we will need to download the <a href='https://www.getmonero.org/downloads/hashes.txt'>hashes.txt</a> for this we will need to download the [hashes.txt](https://www.getmonero.org/downloads/hashes.txt)
14. Now lets verify the hashes in the file, in the nav bar press the decrypt/verify. 14. Now lets verify the hashes in the file, in the nav bar press the decrypt/verify.
@ -203,7 +203,7 @@ In this game its all about who has the better chances, no such thing as 100%, th
- <b>Key Transparency</b> - This basically mean publishing your key so others will know exactly what key belongs to who, protects against social engineering, phishing, etc. - <b>Key Transparency</b> - This basically mean publishing your key so others will know exactly what key belongs to who, protects against social engineering, phishing, etc.
- <b>building projects</b> - Taking the source code and building your own program, this is completely the best zero trust policy existing for software(especially if you know programming languages). - <b>building projects</b> - Taking the source code and building your own program, this is completely the best zero trust policy existing for software(especially if you know programming languages).
check this <a href='http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/compilation/'>post</a> to know more check this [post](../compilation/index.md) to know more
## **Other Usage of PGP Keys** ## **Other Usage of PGP Keys**