How to be Anonymous Online by Eydie A. M
Author:Eydie, A. M.
Language: eng
Format: epub
Published: 2014-07-29T16:00:00+00:00
If you see filename.xxx Good Signature, you have authenticated the file!
If you see filename.xxx Unknown Signature, you have not authenticated the file. Either you did not download the entire file, forgot to import the public PGP key before checking the signature, imported the wrong public PGP key or the signature is wrong or forged.
Authenticate software (Real Life Example)
Here is a real life example using a few demonstration files from my website
Make sure you are connected to the internet, and then open the Tor Browser (Accessories > Internet > Tor Browser)
Go to https://howtobeanonymousonline.info/pgpkey/
Right-click 'Anna M Eydie Public PGP Key', and then select Save Link As
Click Save to save annameydie.asc. Any location will do
Now, go to https://howtobeanonymousonline.info/sigtest/
Right-click 'Some Random File', and then select Save Link As
Click Save to save some_random_file.zip. Any location will do
On the same web page, right-click 'Some Random File Signature', and then select Save Link As
Click Save to save some_random_file.zip.sig. You must save it to the same location as some_random_file.zip
You can close or minimize the Tor Browser
Using the File Manager (Applications > Accessories > Files), navigate to the location of annameydie.asc
Right-click annameydie.asc, and then select Open With Import Key. A 'Key Imported' message will display in the upper right corner of Tails
Now, navigate to the location of some_random_file.zip and some_random_file.zip.sig
Right-click some_random_file.zip.sig, and then select Open With Verify Signature
A 'some_random_file.zip.sig: Good Signature' message will display in the upper right corner of Tails
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(20975)
Hello! Python by Anthony Briggs(20255)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(18618)
Dependency Injection in .NET by Mark Seemann(18409)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(17931)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(17691)
Kotlin in Action by Dmitry Jemerov(17589)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16942)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(16509)
Grails in Action by Glen Smith Peter Ledbrook(15654)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(13464)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(11541)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10582)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10485)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9519)
Hit Refresh by Satya Nadella(9091)
The Kubernetes Operator Framework Book by Michael Dame(8528)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8351)
Robo-Advisor with Python by Aki Ranin(8297)