Compare commits

..

No commits in common. "main" and "0.1" have entirely different histories.
main ... 0.1

5 changed files with 23 additions and 24 deletions

1
.gitignore vendored
View File

@ -1,4 +1,3 @@
tests/__pycache__/ tests/__pycache__/
pkg/** pkg/**
*.pkg.tar.zst *.pkg.tar.zst
*.pkg.tar.zst.sig

View File

@ -1,5 +1,5 @@
depends=('bash>=4.4' 'gnupg>=2.2' 'curl>=7.72' 'Uniglot') depends=('bash>=4.4' 'gnupg>=2.2' 'curl>=7.72' 'Uniglot')
makedepends=('make>=4.2', 'python-pytest') makedepends=('make>=4.2')
checkdepends=() checkdepends=()
optdepends=() optdepends=()
pkgname="$(git config remote.origin.url | rev | cut -f 1 -d '/' | rev | sed 's/.git$//')" pkgname="$(git config remote.origin.url | rev | cut -f 1 -d '/' | rev | sed 's/.git$//')"

14
canary
View File

@ -1,21 +1,21 @@
As of 2024-07-20, the AniNIX has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. AniNIX has never placed any backdoors in our hardware or software and has not received any requests to do so. AniNIX has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on AniNIX assets. As of 2021-01-10, aninix.net has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. AniNIX has never placed any backdoors in our hardware or software and has not received any requests to do so. AniNIX has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on AniNIX assets.
The next two updates should be on or before: The next two updates should be on or before:
* 2024-10-18 * 2021-04-10
* 2025-01-16 * 2021-07-09
Recent news: Recent news:
* https://www.aljazeera.com/news/2024/7/20/did-covids-first-wave-kill-eight-times-more-indians-than-announced?traffic_source=rss</link * https://www.aljazeera.com/news/2021/1/10/kazakh-ruling-party-set-to-retain-hold-on-power-in-sundays-vote</link
* https://www.npr.org/2024/07/20/nx-s1-5045576/a-communist-party-meeting-in-china-aimed-to-chart-a-new-course-for-the-country</link * https://www.npr.org/2021/01/10/955399729/black-boxes-wreckage-located-in-indonesia-air-crash-no-signs-of-survivors</link
To verify this message, on the terminal import our public key from pool.sks-keyservers.net and verify the canary: To verify this message, on the terminal import our public key from pool.sks-keyservers.net and verify the canary:
$ gpg --fetch-keys https://aninix.net/AniNIX/ShadowArch/raw/branch/main/EtcFiles/aninix.gpg $ gpg --keyserver pool.sks-keyservers.net --recv-key 1CC1E3F4ED06F296
$ gpg2 --fingerprint 1CC1E3F4ED06F296 $ gpg2 --fingerprint 1CC1E3F4ED06F296
pub ed25519 2019-05-19 [SC] pub ed25519 2019-05-19 [SC]
904D E627 5579 CB58 9D85 720C 1CC1 E3F4 ED06 F296 904D E627 5579 CB58 9D85 720C 1CC1 E3F4 ED06 F296
uid [ultimate] DarkFeather <ircs://aninix.net:6697/DarkFeather> uid [ultimate] DarkFeather <ircs://aninix.net:6697/DarkFeather>
sub cv25519 2019-05-19 [E] sub cv25519 2019-05-19 [E]
$ gpg --verify <(curl -s https://aninix.net/AniNIX/WarrantCanary/raw/branch/main/canary.asc) 2>&1 | grep 'Good signature' $ gpg --verify <(curl -s https://foundation.aninix.net/AniNIX/WarrantCanary/raw/branch/main/canary.asc) 2>&1 | grep 'Good signature'
gpg: Good signature from "DarkFeather <ircs://aninix.net:6697/DarkFeather>" [ultimate] gpg: Good signature from "DarkFeather <ircs://aninix.net:6697/DarkFeather>" [ultimate]
There will most likely be other lines in the output from that last command, but as long as it says "Good signature", the verification worked correctly. There will most likely be other lines in the output from that last command, but as long as it says "Good signature", the verification worked correctly.

View File

@ -1,31 +1,31 @@
-----BEGIN PGP SIGNED MESSAGE----- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512 Hash: SHA512
As of 2024-07-20, the AniNIX has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. AniNIX has never placed any backdoors in our hardware or software and has not received any requests to do so. AniNIX has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on AniNIX assets. As of 2021-01-10, aninix.net has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. AniNIX has never placed any backdoors in our hardware or software and has not received any requests to do so. AniNIX has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on AniNIX assets.
The next two updates should be on or before: The next two updates should be on or before:
* 2024-10-18 * 2021-04-10
* 2025-01-16 * 2021-07-09
Recent news: Recent news:
* https://www.aljazeera.com/news/2024/7/20/did-covids-first-wave-kill-eight-times-more-indians-than-announced?traffic_source=rss</link * https://www.aljazeera.com/news/2021/1/10/kazakh-ruling-party-set-to-retain-hold-on-power-in-sundays-vote</link
* https://www.npr.org/2024/07/20/nx-s1-5045576/a-communist-party-meeting-in-china-aimed-to-chart-a-new-course-for-the-country</link * https://www.npr.org/2021/01/10/955399729/black-boxes-wreckage-located-in-indonesia-air-crash-no-signs-of-survivors</link
To verify this message, on the terminal import our public key from pool.sks-keyservers.net and verify the canary: To verify this message, on the terminal import our public key from pool.sks-keyservers.net and verify the canary:
$ gpg --fetch-keys https://aninix.net/AniNIX/ShadowArch/raw/branch/main/EtcFiles/aninix.gpg $ gpg --keyserver pool.sks-keyservers.net --recv-key 1CC1E3F4ED06F296
$ gpg2 --fingerprint 1CC1E3F4ED06F296 $ gpg2 --fingerprint 1CC1E3F4ED06F296
pub ed25519 2019-05-19 [SC] pub ed25519 2019-05-19 [SC]
904D E627 5579 CB58 9D85 720C 1CC1 E3F4 ED06 F296 904D E627 5579 CB58 9D85 720C 1CC1 E3F4 ED06 F296
uid [ultimate] DarkFeather <ircs://aninix.net:6697/DarkFeather> uid [ultimate] DarkFeather <ircs://aninix.net:6697/DarkFeather>
sub cv25519 2019-05-19 [E] sub cv25519 2019-05-19 [E]
$ gpg --verify <(curl -s https://aninix.net/AniNIX/WarrantCanary/raw/branch/main/canary.asc) 2>&1 | grep 'Good signature' $ gpg --verify <(curl -s https://foundation.aninix.net/AniNIX/WarrantCanary/raw/branch/main/canary.asc) 2>&1 | grep 'Good signature'
gpg: Good signature from "DarkFeather <ircs://aninix.net:6697/DarkFeather>" [ultimate] gpg: Good signature from "DarkFeather <ircs://aninix.net:6697/DarkFeather>" [ultimate]
There will most likely be other lines in the output from that last command, but as long as it says "Good signature", the verification worked correctly. There will most likely be other lines in the output from that last command, but as long as it says "Good signature", the verification worked correctly.
-----BEGIN PGP SIGNATURE----- -----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQSQTeYnVXnLWJ2FcgwcweP07QbylgUCZpyQuQAKCRAcweP07Qby iHUEARYKAB0WIQSQTeYnVXnLWJ2FcgwcweP07QbylgUCX/vI1wAKCRAcweP07Qby
lnQrAP9fzkLZ+XHUfE0q/j4kDsXce+mrQq8fZ85UNSBzm1a5YQD+MeXRSItwab8l lsP1AQCMVDKlFretUSwh52FCaiMnHRIXlleGV15YG4c+njnecwEA9PICOHad/6wX
T9kJFk1tB4Wqzo30lwpJ/vemgF48vQA= ira6GAgJFRV9klsmsvqrot24r2uNZQ4=
=Izp6 =jtak
-----END PGP SIGNATURE----- -----END PGP SIGNATURE-----

View File

@ -8,7 +8,7 @@ unset canaryText
# cskey=E9C7C942 # cskey=E9C7C942
keyserver=pool.sks-keyservers.net keyserver=pool.sks-keyservers.net
key=1CC1E3F4ED06F296 key=1CC1E3F4ED06F296
canary=https://aninix.net/AniNIX/WarrantCanary/raw/branch/main/canary.asc canary=https://foundation.aninix.net/AniNIX/WarrantCanary/raw/branch/main/canary.asc
unset gitCommit unset gitCommit
alJazeera='https://www.aljazeera.com/xml/rss/all.xml' alJazeera='https://www.aljazeera.com/xml/rss/all.xml'
alJazeeraDate="$(date +%Y/%m/%d | sed -s 's#/0#/#g')" alJazeeraDate="$(date +%Y/%m/%d | sed -s 's#/0#/#g')"
@ -43,13 +43,13 @@ function RecentNews() {
# param rssFeed: the url to pull # param rssFeed: the url to pull
rssFeed="$1" rssFeed="$1"
date="$2" date="$2"
curl -s "$rssFeed" | grep "$date" | tr '>' '\n' | grep /link | tail -n 1 curl -s "$rssFeed" | grep "$date" | egrep -m 5 link | tail -n 1 | cut -f 2 -d '>' | cut -f 1 -d '?'
} }
function CreateCanary() { function CreateCanary() {
rm ./canary.asc rm ./canary.asc
cat > ./canary << EOM cat > ./canary << EOM
As of $(date +%F), the AniNIX has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. AniNIX has never placed any backdoors in our hardware or software and has not received any requests to do so. AniNIX has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on AniNIX assets. As of $(date +%F), aninix.net has not received any National Security Letters or FISA court orders, and we have not been subject to any gag order(s) by a FISA court, or any other similar court(s) of any government. AniNIX has never placed any backdoors in our hardware or software and has not received any requests to do so. AniNIX has never disclosed any user communications to any third party. No searches or seizures of any kind have ever been performed on AniNIX assets.
The next two updates should be on or before: The next two updates should be on or before:
* `date -d @$(( $time + 7776000 )) +%F` * `date -d @$(( $time + 7776000 )) +%F`
@ -60,7 +60,7 @@ Recent news:
* $(RecentNews "$npr" "$nprdate") * $(RecentNews "$npr" "$nprdate")
To verify this message, on the terminal import our public key from $keyserver and verify the canary: To verify this message, on the terminal import our public key from $keyserver and verify the canary:
$ gpg --fetch-keys https://aninix.net/AniNIX/ShadowArch/raw/branch/main/EtcFiles/aninix.gpg $ gpg --keyserver $keyserver --recv-key $key
$ gpg2 --fingerprint $key $ gpg2 --fingerprint $key
$(gpg2 --fingerprint $key) $(gpg2 --fingerprint $key)
$ gpg --verify <(curl -s $canary) 2>&1 | grep 'Good signature' $ gpg --verify <(curl -s $canary) 2>&1 | grep 'Good signature'