๐Ÿ” Code Transparency

Trust, but verify. This page provides cryptographic proof that the code running on this server matches the source code published on GitHub. You don't have to trust us โ€” you can verify it yourself.

โŸณ Loading deployment information...

๐Ÿ“‹ Current Deployment

Git Commit Loading...
Branch Loading...
Build Time Loading...
GPG Signed Checking...

๐Ÿ” File Verification

The following files are deployed with their SHA256 hashes. You can verify each one matches the source.

โŸณ Loading file manifest...

๐Ÿ›ก๏ธ How to Verify

Option 1: Quick Verification (requires curl, jq)

curl -sL https://derlocke.net/transparency/verify.sh | bash

Option 2: Manual Verification

  1. Download the manifest.json
  2. Compare the git commit hash with the GitHub repository
  3. For any file, compute its SHA256 hash and compare:
    curl -sL https://derlocke.net/style.css | sha256sum
  4. If GPG-signed, verify the signature:
    gpg --verify manifest.sig manifest.json

Option 3: Full Source Comparison

# Clone the repo at the deployed commit
git clone https://github.com/derlocke-ng/derlocke-blog
cd derlocke-blog
git checkout COMMIT_HASH

# Build locally and compare
./build.sh
sha256sum *.html *.css *.js

๐Ÿค” Why This Matters

Traditional web services require you to trust the operator. With code transparency:

  • Verifiable deployments โ€” Know exactly what code is running
  • Tamper detection โ€” Any unauthorized changes are detectable
  • Audit trail โ€” Every deployment is linked to a git commit
  • Open source proof โ€” Not just open source, but verifiably deployed

This is especially important for services that handle sensitive data. While this blog itself is static, the services I host follow the same transparency principles.

๐Ÿ”‘ GPG Public Key

Manifests may be signed with the following GPG key:

Key not yet configured. Check back soon!

๐Ÿ” Lookup on Keyserver

Services: ๐Ÿ” VPN ๐Ÿ’ฌ XMPP ๐Ÿ“‹ Paste ๐ŸŽ™๏ธ Mumble ๐Ÿ“ฆ Git