|
@@ -56,3 +56,21 @@ As a developer, you can become a Bounty Hunter and win bounties (earn money) by
|
|
contributing to |project_name|, a free and open source software project.
|
|
contributing to |project_name|, a free and open source software project.
|
|
|
|
|
|
We might also use BountySource to fund raise for some bigger goals.
|
|
We might also use BountySource to fund raise for some bigger goals.
|
|
|
|
+
|
|
|
|
+.. _security-contact:
|
|
|
|
+
|
|
|
|
+Security
|
|
|
|
+--------
|
|
|
|
+
|
|
|
|
+In case you discover a security issue, please use this contact for reporting it privately
|
|
|
|
+and please, if possible, use encrypted E-Mail:
|
|
|
|
+
|
|
|
|
+Thomas Waldmann <tw@waldmann-edv.de>
|
|
|
|
+
|
|
|
|
+GPG Key Fingerprint: 6D5B EF9A DD20 7580 5747 B70F 9F88 FB52 FAF7 B393
|
|
|
|
+
|
|
|
|
+The public key can be fetched from any GPG keyserver, but be careful: you must
|
|
|
|
+use the **full fingerprint** to check that you got the correct key.
|
|
|
|
+
|
|
|
|
+`Releases <https://github.com/borgbackup/borg/releases>`_ are signed with this GPG key,
|
|
|
|
+please use GPG to verify their authenticity.
|