Avatar
Offbeat Neglected Prawn
ff2ceb63833534d6e5b294b268501d62c53dcd2f05ee169f624ca1dc7cffe234
The #Fediverse is the network, NOSTR is one of its protocols

when i first learned of #nostr I thought it was just #Mastodon for #crypto nerds, but the more I'm learning about it, the more I like it

Replying to Avatar d34e832d...

Verifying the integrity of downloaded software using a public key involves a series of steps to ensure that the software is authentic and hasn't been tampered with. Here’s a detailed outline of the 5-step procedure:

1. **Downloading the public key of the software’s author:**

- Visit the official website of the software or a trusted key server.

- Locate and download the public key associated with the software's author. The public key is typically provided in a `.asc` or `.pgp` file format.

2. **Checking the key’s fingerprint:**

- Verify the fingerprint of the downloaded public key to ensure its authenticity.

- The fingerprint should be provided by a trusted source, such as the software’s official website.

- Use a command such as `gpg --fingerprint ` to display the fingerprint and compare it with the one provided.

3. **Importing the public key:**

- Import the verified public key into your keyring using a command like `gpg --import `.

- This step makes the public key available for verifying the downloaded software.

4. **Downloading the signature file of the software:**

- Obtain the signature file associated with the software. This file is often provided alongside the software download and typically has a `.sig` or `.asc` extension.

- Ensure you download the correct signature file that corresponds to the software version you have downloaded.

5. **Verify the signature file:**

- Use the imported public key to verify the signature file against the downloaded software.

- Run a command such as `gpg --verify `.

- Check the output to ensure the signature is valid and that the software has not been altered. A successful verification will indicate that the software is authentic and untampered.

By following these steps, you can confidently verify the integrity and authenticity of the software you have downloaded.

sure but who actually does that?

nothing less than open borders is acceptable for #libertarians who might be Libertarians someday if we ever find our balls (hint they are currently in Angela's purse)

Replying to Avatar Tucson Sentinel

Maricopa County conducts mock election to prepare for two-page ballot https://www.tucsonsentinel.com/local/report/053024_maricopa_mock_election/maricopa-county-conducts-mock-election-prepare-two-page-ballot/

Maricopa County held a mock election Wednesday to prepare poll workers and election officials for the upcoming November election to learn what challenges they’ll face with processing and counting ballots that will be two pages long.

#Tucson #Arizona

When I lived in Texas we had over 100 races on the ballot, they'll do fine, or they are lying to you

just finished 99: Stories of the Game by Wayne Gretsky. Just picked up On Anarchism by Noam Chomsky

Weaks Earned the Beyond a shadow of a Stout (Level 8) badge on #Untappd while drinking a #Founder's KBS Spicy Chocolate Stout at #UntappdAtHome

#m=image%2Fjpeg&dim=997x1016&blurhash=%7C7C%3FS%7Ct600Rk%25Jxt%5EbNH0O%7D%25js03WB-%3As%3A-oRkNMA1az-4oL-oWC0Noe%5E%230naz%3FCoe-%3AWD0Ns.%5EzIUazShoe%25LWBWBoeR%2C-OayNfj%5BIVay%3FEj%5D9d9Gfk%3FGj%40E3azxsayR.9%25j%5B%5E%25j%5BIVayI%3Dj%5BxB01ax-.a%7DRjaykDofoc&x=55f0858ea34ef8bdbbf96011987a11bb4f746ea7d09017212bbfae67547ecc4b