crwdns2933423:0crwdne2933423:0

crwdns2933803:04crwdne2933803:0

crwdns2933797:0Jacob Mehnertcrwdnd2933797:0crwdne2933797:0

crwdns2936043:0crwdne2936043:0 crwdns2933505:0crwdne2933505:0 Jacob Mehnert

crwdns2933769:0crwdne2933769:0
crwdns2933771:0crwdne2933771:0
crwdns2933801:0crwdne2933801:0

crwdns2933807:0crwdne2933807:0

+[title] Verify your Key Again
+[* icon_note] Part of the reason you are Verifying the key a second time with a third party PGP key server is to ensure that the Signing Key has not been compromised by potential bad actors.
+[* black] Using Tor, go to [link|http://pgp.mit.edu|pgp.mit.edu] and enter ***Tails Developers*** into the Search String field.
+[* black] Ensure the option for ***Show PGP fingerprints for keys*** is checked, then click ***Search***.
+ [* icon_note] You will recieve several different results, but the one you are going to want is the ***offline long-term identity key***
+[* black] Compare the fingerprint generated from GNU Privacy Assistant to the fingerprint shown by pgp. If they are the same, then the file is safe to use.