Canary
You can also use this PGP key to contact us. There is a signed message attached to this page, it is updated every week atleast to verify that the services have not been compromised (to our knowledge).
PGP
Fingerprint: 776C95F2D1EF177DCF42D348B821DA24CF66F6D9
How do i verify the canary message?
On a machine with the GPG utility you need to download and import the syn.rip public key:
$ wget syn.rip/pgp.asc && gpg --import anarc.asc
Take note of the fingerprint, this should never change.
$ gpg --fingerprint
/home/user/.gnupg/pubring.kbx
------------------------------
pub ed25519 2024-06-03 [SC] [expires: 2026-01-02]
776C 95F2 D1EF 177D CF42 D348 B821 DA24 CF66 F6D9
uid [ultimate] syn.rip
sub cv25519 2024-06-03 [E] [expires: 2026-01-02]
Mark our key as valid:
$ gpg --lsign-key "776C 95F2 D1EF 177D CF42 D348 B821 DA24 CF66 F6D9"
Now, verify the canary message:
$ wget -q syn.rip/canary.txt && cat canary.txt && gpg --verify output.txt
Pay attention to the last 2 lines:
...
gpg: using EDDSA key 776C95F2D1EF177DCF42D348B821DA24CF66F6D9
gpg: Good signature from "syn.rip (syn.rip admins) <contact@syn.rip>" [ultimate]