-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Two steps are required to cryptographically verify image integrity. 1. By verifying the integrity of this signature file, you can be sure that the checksums included in this file are valid. $ gpg --keyserver hkp://pool.sks-keyservers.net --recv-keys 0xA16EB94D $ gpg --list-keys 0xA16EB94D pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12] uid Turnkey Linux Release Key $ gpg --verify debian-8-turnkey-pligg_14.0-1_amd64.ova.sig gpg: Good signature from "Turnkey Linux Release Key" 2. By calculating the image checksum and validating the hashed value is the same as listed below, you can be sure the image was not corrupted in transit or tampered with. $ md5sum debian-8-turnkey-pligg_14.0-1_amd64.ova 7b7d0b2a09c35a002f1cf2094139a9fc $ sha1sum debian-8-turnkey-pligg_14.0-1_amd64.ova 8c314f6415ae3c9e132096baaade0f81c3122b7a -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJWObxVAAoJEIXCXpWhbrlNEoAH/1sUHvjIYXhJcPBJNT4oc8pN xpt1g9aeivqno6FdGNotnycU5immGKN+ocRFkPiK2o+TRUmmOiwVdKVhIaB4oXUB Ajkly1t6RihbHVyoVB0T/EXs+0Slzo1DG9X2pMXkBiFtJfNz5dsPG0VzRt4slvz1 x38XboF3b9fSqabRIirJcAxwoeNDMcrBbxopN1NjUIFri6p/0wxGbYGYYQIQOAEr opyFpcO7X/t4BTH+bW06OOgqz5PUvnA1Xp+Ra5SNBXP+pxEHFCgPZOTeUqkXP3KA K0jzunmE+7EVkt0SZMbkit7Ii+geVkuu2eP1+0tcMvfvKUiJNcmbIFmmdWmuz0s= =7d8y -----END PGP SIGNATURE-----