It is highly recommended to verify the authenticty of the downloaded files before installing them by checking the PGP signatures. Alternatively you can verify the file integrity by calculating the checksums. You may do so by following the instructions provided here.
- Download Sphere_by_Horizen-1.21.0.exe and Sphere_by_Horizen-1.21.0.exe.asc and store the files in your Downloads folder.
- Download the GNUPG package from https://www.gpg4win.org/get-gpg4win.html
- Proceed with the installation and launch Kleopatra.
- Unless you already have a personal GPG key, you will have to create one (required for step 6):
- Select the menu item File -> New keypair -> Create a personal OpenPGP key pair.
- Enter a name and an email address that suit you personally.
- Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use GNUPG in future).
- Import the key used to sign releases:
- File -> Lookup on Server
- Allow network access to 'dirmngr', if the prompt arises
- Search for [email protected]
- Select and import the key
- Do not certify the key just yet
- Right-click on the key, and choose "Details"
- Ensure that the fingerprint is 219F 5574 0BBF 7A1C E368 BA45 FB70 53CE 4991 B669
- If it's not, the wrong key was imported, right click and delete
- If it is, we are good to go
- Certify the key (this designates trust and is required for the next step):
- Once you have a personal GPG key, right-click on the imported key and choose Certify
- Enable the user ID
- Tick the I have verified the fingerprint checkbox (since you did, as per step 5), and proceed.
- You should receive a message saying Certification successful
- Verify the installer binary:
- Click the Decrypt/Verify button on the Kleopatra toolbar
- Choose the Downloads\Sphere_by_Horizen-1.21.0.exe file in the file dialog (the .asc signature file must reside in the same directory)
- If the verification is successful, you will receive a green-tinted message box saying:
- Valid signature by [email protected]
- Date of signature
- With certificate 219F 5574 0BBF 7A1C E368 BA45 FB70 53CE 4991 B669
- Anything else would constitute a signature verification failure.
- Download Sphere_by_Horizen-1.21.0.exe and Sphere_by_Horizen-1.21.0.exe.sha256 and store the files in your Downloads folder
- Open a PowerShell window
- Verify the checksums by copy/pasting the following commands:
cd ~\Downloads $targetHash = (Get-Content -Path Sphere_by_Horizen-1.21.0.exe.sha256 -Delimiter " ")[0].Trim() $fileName = (Get-Content -Path Sphere_by_Horizen-1.21.0.exe.sha256 -Delimiter " ")[2].Trim() if ($(certutil -hashfile $fileName SHA256)[1] -replace " ","" -eq $targetHash) { Write-Host $fileName": OK" } else { Write-Host $fileName": FAILED`nWARNING: 1 computed checksum did NOT match" }
- The output of the command should equal:
Sphere_by_Horizen-1.21.0.exe: OK
- Download Sphere_by_Horizen-1.21.0.dmg and Sphere_by_Horizen-1.21.0.dmg.asc and store the files in your Downloads folder.
- If you already have the GPG Suite installed, and a personal key generated, please skip to step 5, and if not, proceed with the next step.
- Go to https://gpgtools.org, head to the GPG Suite section, download the .dmg file and install it:
- Right-click the .dmg file, then Open, which will open a new window with two icons: Install and Uninstall
- Right-click the Install icon, and choose Open with.. -> Installer, which should start the GPG Suite installer
- Follow through the installation wizard
- Once GPG Suite installation completes, it will ask you to create a new key pair (this is required for step 6, so please don’t skip it):
- Enter a name and an email that suit you personally.
- Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GPG Suite in future).
- Import the key used to sign releases:
- Select Key -> Lookup Key on Key Server in the application menu
- Search for [email protected]
- Choose the key with fingerprint 4991B669 with the user ID "cronic [email protected]", then click Retrieve Key
- Verify (right-click the imported key, then Details) that the fingerprint of the imported key is 219F 5574 0BBF 7A1C E368 BA45 FB70 53CE 4991 B669
- If it’s not, the wrong key was imported, right-click and delete
- If it is, we are good to proceed with the next step.
- Sign the imported key (this designates trust and is required for the next step):
- Right-click on the imported key, then "Sign".
- Verify the installer binary:
- Right-click the Sphere_by_Horizen-1.21.0.dmg file in Finder (do NOT right click on the .asc file, that will not work), then select Services -> OpenPGP: Verify Signature of File (the .asc signature file must reside in the same directory)
- The Verification Results dialog will then appear with the verdict:
Trusted signature cronic <[email protected]> 219F 5574 0BBF 7A1C E368 BA45 FB70 53CE 4991 B669
- Anything different means there was no valid signature for the installer.
- Download Sphere_by_Horizen-1.21.0.dmg and Sphere_by_Horizen-1.21.0.dmg.sha256 and store the files in your Downloads folder
- Open a Terminal window
- Verify the checksums by copy/pasting the following command:
cd ~/Downloads \ && shasum -a256 -c Sphere_by_Horizen-1.21.0.dmg.sha256
- The output of the command should equal:
Sphere_by_Horizen-1.21.0.dmg: OK
- Download Sphere_by_Horizen-1.21.0.deb and Sphere_by_Horizen-1.21.0.deb.asc and store the files in your Downloads folder for Debian based systems, or Sphere_by_Horizen-1.21.0.AppImage and Sphere_by_Horizen-1.21.0.AppImage.asc and store the files in your Downloads folder for all other Linux systems.
- Ensure that the gpg2 command is available (assuming Ubuntu Linux) in your shell, and if not execute the following shell command:
sudo apt-get update \ && sudo apt-get install gnupg2 dirmngr
- Unless you already have a personal GPG key, create one (this is required for step 5):
gpg2 --generate-key
- Supply a user ID (real name and email) that suit you personally
- Choose a passphrase to protect your personal key (NOTE: the passphrase can be empty, but it is not recommended if you intend to use this key and GNUPG in future)
- Import the key used to sign releases:
gpg2 --keyserver hkps://keys.openpgp.org --recv-keys 219F55740BBF7A1CE368BA45FB7053CE4991B669
- The output of the command should show:
gpg: key FB7053CE4991B669: public key "cronic <[email protected]>" imported gpg: Total number processed: 1 gpg: imported: 1
- Sign the key (this designates trust and is required for the next step):
gpg2 --lsign 219F55740BBF7A1CE368BA45FB7053CE4991B669
- Verify the installer binary using the .asc signature (the .asc signature file must reside in the same directory as the installer binary):
cd ~/Downloads \ && gpg2 --verify Sphere_by_Horizen-1.21.0.*.asc
- Successful verification should produce a message like follows:
gpg: assuming signed data in 'Sphere_by_Horizen-1.21.0.{extension}' gpg: Signature made Tue 26 Oct 2021 14:48:10 UTC gpg: using RSA key FB7053CE4991B669 gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2023-04-06 gpg: Good signature from "cronic <[email protected]>" [full] gpg: aka "cronic <[email protected]>" [full] gpg: aka "cronic <[email protected]>" [full] gpg: aka "cronic <[email protected]>" [full]
- Download Sphere_by_Horizen-1.21.0.deb and Sphere_by_Horizen-1.21.0.deb.sha256 and store the files in your Downloads folder for Debian based systems, or Sphere_by_Horizen-1.21.0.AppImage and Sphere_by_Horizen-1.21.0.AppImage.sha256 and store the files in your Downloads folder for all other Linux systems.
- Open a Terminal window
- Verify the checksums by copy/pasting the following command:
cd ~/Downloads \ && sha256sum -c Sphere_by_Horizen-1.21.0.*.sha256
- The output of the command should equal:
Sphere_by_Horizen-1.21.0.{extension}: OK