RPMS
We use the GPG version for encryption and signing RPM files for download.
To confirm that a downloaded
RPM file has not been tampered with, the following command can be used:
rpm -K file_name.rpm
This will test both the MD5 and the GPG signature. For this to
work, you should add our public key to
your gpg key ring. You can also check the fingerprint for this
key (listed at bottom of this page).
Encrypting Files and EMAIL
You can also use this public key to encrypt files meant for us to decrypt.
-----BEGIN PGP PUBLIC KEY BLOCK-----Version: GnuPG v1.4.1 (GNU/Linux)
Key fingerprint = 9D98 5C15 557B 013D F6FC 26A6 DF58 8927 5F18 1389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=EGYe
-----END PGP PUBLIC KEY BLOCK-----