Commits and releases are cryptographically signed with my GPG key F744D8C299C05EAA to ensure authenticity.
Find public sources of trust for my GPG key ID F744D8C299C05EAA, e.g. my website, GitHub, or similar.
Verify the integrity of this guide by comparing the key ID and fingerpint throughout.
- Clone the repository.
- Checkout a release tag or commit and take note of the signature, e.g:
git tag -v v1.0.0
git log --show-signature
- Import my public key:
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys F744D8C299C05EAA
- Show the fingerprint:
gpg --fingerprint F744D8C299C05EAA
- Verify that the fingerprint from the keyserver matches:
- The git tag signature.
- This guide.
- The public source of trust.
- Import my public key:
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys F744D8C299C05EAA
- Download one of the release files (tarball or zip).
- Download the SHA256SUMS.asc file which is a signed file containing checksums.
- In the directory of the downloaded files, verify the integrity:
gpg --verify SHA256SUMS.asc
- Ensure the output shows my name
Chris Yarbroughand key fingerprint98A78974F886777AB85CF1D0F744D8C299C05EAA. - Verify the checksum(s):
The output should indicate, e.g.
sha256sum -c SHA256SUMS.asc
ucll-linux-arm64.tar.gz: OK.