Skip to content

Commit e79089c

Browse files
authored
Update a few software versions, hashes
1 parent 551231b commit e79089c

File tree

1 file changed

+25
-26
lines changed

1 file changed

+25
-26
lines changed

README.md

Lines changed: 25 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -502,9 +502,9 @@ Programs such as [Little Snitch](https://www.obdev.at/products/littlesnitch/inde
502502
*Example of Little Snitch-monitored session*
503503

504504
```
505-
LittleSnitch-3.7.4.dmg
506-
SHA-256: b0ce3519d72affbc7910c24c264efa94aa91c9ad9b1a905c52baa9769156ea22
507-
SHA-1: 868ad75623c60cb9ad428c7c1d3e5ae449a9033e
505+
LittleSnitch-4.0.3.dmg
506+
SHA-256: af93abb070cbac96cdda7e150668115c34447f2779dc707f8a79879c60f4c3bf
507+
SHA-1: 63f1cf6c47def2774040b26add388068ae4b00f5
508508
```
509509

510510
These programs are capable of monitoring and blocking **incoming** and **outgoing** network connections. However, they may require the use of a closed source [kernel extension](https://developer.apple.com/library/mac/documentation/Darwin/Conceptual/KernelProgramming/Extend/Extend.html).
@@ -1189,17 +1189,15 @@ You can use OTR on top of any existing [XMPP](https://xmpp.org/about) chat servi
11891189

11901190
The first time you start a conversation with someone new, you'll be asked to verify their public key fingerprint. Make sure to do this in person or by some other secure means (e.g. GPG encrypted mail).
11911191

1192-
A popular macOS GUI client for XMPP and other chat protocols is [Adium](https://adium.im/)
1193-
1194-
Consider downloading the [beta version](https://beta.adium.im/) which uses OAuth2, making logging in to Google accounts [more](https://adium.im/blog/2015/04/) [secure](https://trac.adium.im/ticket/16161).
1192+
A popular macOS GUI client for XMPP and other chat protocols is [Adium](https://adium.im/).
11951193

11961194
```
1197-
Adium_1.5.11b3.dmg
1198-
SHA-256: 999e1931a52dc327b3a6e8492ffa9df724a837c88ad9637a501be2e3b6710078
1199-
SHA-1: ca804389412f9aeb7971ade6812f33ac739140e6
1195+
Adium_1.5.10.4.dmg
1196+
SHA-256: 31fa3fd32b86dd3381b60e0d5aafbc2a9452036f0fb4963bffbc2a6c64a9458b
1197+
SHA-1: 8a674a642447839ea287aed528194e4fd32763b8
12001198
```
12011199

1202-
Remember to [disable logging](https://trac.adium.im/ticket/15722) for OTR chats with Adium.
1200+
Remember to [disable logging](https://trac.adium.im/ticket/15722) for off the record chats with Adium.
12031201

12041202
A good console-based XMPP client is [profanity](http://www.profanity.im/), which can be installed with `brew install profanity`
12051203

@@ -1218,32 +1216,33 @@ Do **not** attempt to configure other browsers or applications to use Tor as you
12181216
Download both the `dmg` and `asc` signature files, then verify the disk image has been signed by Tor developers:
12191217

12201218
```
1221-
$ cd Downloads
1219+
$ cd ~/Downloads
12221220
12231221
$ file Tor*
1224-
TorBrowser-6.0.5-osx64_en-US.dmg: bzip2 compressed data, block size = 900k
1225-
TorBrowser-6.0.5-osx64_en-US.dmg.asc: PGP signature Signature (old)
1222+
TorBrowser-7.0.10-osx64_en-US.dmg: bzip2 compressed data, block size = 900k
1223+
TorBrowser-7.0.10-osx64_en-US.dmg.asc: PGP signature Signature (old)
12261224
12271225
$ gpg Tor*asc
1228-
gpg: assuming signed data in `TorBrowser-6.0.5-osx64_en-US.dmg'
1229-
gpg: Signature made Fri Sep 16 07:51:52 2016 EDT using RSA key ID D40814E0
1230-
gpg: Can't check signature: public key not found
1226+
gpg: assuming signed data in 'TorBrowser-7.0.10-osx64_en-US.dmg'
1227+
gpg: Signature made Thu Nov 9 08:58:11 2017 PST
1228+
gpg: using RSA key 0xD1483FA6C3C07136
1229+
gpg: Can't check signature: No public key
12311230
12321231
$ gpg --recv 0x4E2C6E8793298290
1233-
gpg: requesting key 0x4E2C6E8793298290 from hkp server keys.gnupg.net
12341232
gpg: key 0x4E2C6E8793298290: public key "Tor Browser Developers (signing key) <torbrowser@torproject.org>" imported
12351233
gpg: no ultimately trusted keys found
12361234
gpg: Total number processed: 1
1237-
gpg: imported: 1 (RSA: 1)
1235+
gpg: imported: 1
12381236
1239-
$ gpg Tor*asc
1240-
gpg: assuming signed data in 'TorBrowser-6.0.5-osx64_en-US.dmg'
1241-
gpg: Signature made Fri Sep 16 07:51:52 2016 EDT using RSA key ID D40814E0
1237+
$ gpg --verify Tor*asc
1238+
gpg: assuming signed data in 'TorBrowser-7.0.10-osx64_en-US.dmg'
1239+
gpg: Signature made Thu Nov 9 08:58:11 2017 PST
1240+
gpg: using RSA key 0xD1483FA6C3C07136
12421241
gpg: Good signature from "Tor Browser Developers (signing key) <torbrowser@torproject.org>" [unknown]
12431242
gpg: WARNING: This key is not certified with a trusted signature!
12441243
gpg: There is no indication that the signature belongs to the owner.
12451244
Primary key fingerprint: EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290
1246-
Subkey fingerprint: BA1E E421 BBB4 5263 180E 1FC7 2E1A C68E D408 14E0
1245+
Subkey fingerprint: A430 0A6B C93C 0877 A445 1486 D148 3FA6 C3C0 7136
12471246
```
12481247

12491248
Make sure `Good signature from "Tor Browser Developers (signing key) <torbrowser@torproject.org>"` appears in the output. The warning about the key not being certified is benign, as it has not yet been manually assigned trust.
@@ -1253,7 +1252,7 @@ See [How to verify signatures for packages](https://www.torproject.org/docs/veri
12531252
To finish installing Tor Browser, open the disk image and drag the it into the Applications folder, or with:
12541253

12551254
```
1256-
$ hdiutil mount TorBrowser-6.0.5-osx64_en-US.dmg
1255+
$ hdiutil mount TorBrowser-7.0.10-osx64_en-US.dmg
12571256
12581257
$ cp -rv /Volumes/Tor\ Browser/TorBrowser.app /Applications
12591258
```
@@ -1293,7 +1292,7 @@ Signature size=4247
12931292
Authority=Developer ID Application: The Tor Project, Inc (MADPSAYN6T)
12941293
Authority=Developer ID Certification Authority
12951294
Authority=Apple Root CA
1296-
Signed Time=Aug 7, 2017, 1:43:17 AM
1295+
Signed Time=Nov 9, 2017, 12:47:58 AM
12971296
Info.plist entries=22
12981297
TeamIdentifier=MADPSAYN6T
12991298
Sealed Resources version=2 rules=12 files=130
@@ -1737,9 +1736,9 @@ Santa uses the [Kernel Authorization API](https://developer.apple.com/library/co
17371736
To install Santa, visit the [Releases](https://github.com/google/santa/releases) page and download the latest disk image, the mount it and install the contained package:
17381737

17391738
```
1740-
$ hdiutil mount ~/Downloads/santa-0.9.14.dmg
1739+
$ hdiutil mount ~/Downloads/santa-0.9.20.dmg
17411740
1742-
$ sudo installer -pkg /Volumes/santa-0.9.14/santa-0.9.14.pkg -tgt /
1741+
$ sudo installer -pkg /Volumes/santa-0.9.20/santa-0.9.20.pkg -tgt /
17431742
```
17441743

17451744
By default, Santa installs in "Monitor" mode (meaning, nothing gets blocked, only logged) and comes with two rules: one for Apple binaries and another for Santa software itself.

0 commit comments

Comments
 (0)