To view the list of links, please access this site using Tor Browser.
If you’re seeing this message, access is restricted for regular browsers.
Already using Tor? If you are sure you’re currently in Tor Browser, proceed to our .onion version:
Information available in advance is always published
The day of the update, the admin has control over when they release the passphrase to the public. It may be as soon the critical phase is done, because the FUD grows too much, or even after the service is back up again. Any case, by doing so, they provide hard proof the downtime was expected and not, the result of an attack, seizure, DDoS, meth addiction, tripping cat, whatever.
This is an update we've been planning for two weeks. Check this PGP message from 15 days ago here (xxx) with passphrase (yyy).
However each time a market posts someone will know an update etc is coming and this also gives preparation even if its fully encrypted.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 I Like the IDEA. Maybe instead of using dread as a trusted timestamp, use like something like the last mined hash. Bc what if dread and the service goes down at the same time. Great idea -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQQhYtiuwyCguivkIiUJL6pY9kBN1gUCaG7gcQAKCRAJL6pY9kBN 1qqFAQD7EmN3zqayvldGlSayluoxNNMTLPQWSPaF4tvSz9RwxQEAtc3l10N4ZTV5 gH4d7yQCZXIqS01BbP7xmhwSw0CrOwo= =E4FW -----END PGP SIGNATURE-----
To verify it:
1. Verify the PGP signature of the message.
2. Lookup the transaction to prove it was mined in a block that pre-dates the event.
3. Calculate the SHA256 of the message (minus the transaction hash). For example, open a terminal and run "shasum -a 256", paste just the message, Ctrl-D to finish.
4. Verify the message hashes match.