this post was submitted on 27 Feb 2025
11 points (92.3% liked)
Privacy
34309 readers
1864 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Signature verification protects you against malicious actors. Generally its not critical, but if you're worried about the source you're getting software from, then I highly recommend that you verify the signature. Ideally, you're given an
asc
file with the distribution and assuming you have PGP installed (and have a key), it's pretty easy.First you want to import the public key they are saying that they use to sign all of their distributions;
Once it's in your keyring, you sign it with your own key;
This is you telling the keyring that you trust this exact signing key, so now when you verify anything using that signing key (no matter where you get it from) you'll get a little message saying "hey, we know who this is, this is probably safe!";
In all reality, signing archives like this isn't really necessary anymore. In the early days of the internet when resources were scarce and web-servers didn't have 100% uptime, people mainly got software from FTP servers that weren't up all the time. So you have to search and hunt for software and sometimes get it from random places. This was a way for you to ensure that even though you didn't get it from an official source, that the software you were about to put on your machine wasn't messed with.
These days you're gonna get it directly from Mullvad--but even so, using signing keys protects you from MITM attacks, so that's always cool. lol.
Thank you for taking the time to write all that! I did do what you described, but the RSA key I got at the end was different from what Mullvad's webpage says, which is the same as what you put, I think: 6131 . . . etc.
Good signature from "Tor Browser Developers (signing key) <[email protected]>" [full]
Did you see this notification at all when you verified the key signature?
Yes, I got:
Good signature from "Tor Browser Developers (signing key) <[email protected]>" [full]
Does that mean it's ok? Maybe Mullvad just needs to update their website?