-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 This page serves as informational purpose for any news related to Paranoid Secure Hosting. All updates on this page are signed with the Paranoid Secure Hosting OpenPGP key. The OpenPGP public key can be imported from: https://hosting.d9ping.nl/mail/7637487CEB21CFBF21AA448B4267880693D1329E.asc Fingerprint: 7637487CEB21CFBF21AA448B4267880693D1329E Algorithm: RSA 4096 bits Long Key-ID: 4267880693D1329E Valid till: 2024-01-01(YYYY-MM-DD) Previous valid till: 2023-01-01(YYYY-MM-DD) And previous valid till: 2021-01-01(YYYY-MM-DD) Any message before before 2018-01-01(YYYY-MM-DD) 12:00(UTC) are signed with our old OpenPGP key. Import from: https://hosting.d9ping.nl/mail/C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2_expired.asc Algorithm: RSA 3072 bits Fingerprint: C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2 Valid till: 2018-01-01(YYYY-MM-DD) 12:00(UTC). -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEdjdIfOshz78hqkSLQmeIBpPRMp4FAmQEp9EACgkQQmeIBpPR Mp5aSg//dwcRDR7i1BEFTDsdRiHmI4S9IlcvPIApj9HuXySYSR2mvy3S4gvWZ2cJ JVmENLP4RhtdPDXElCi226R35uP7/8Vanu8wutABXRnhpHJbK45SUthYQD7HpB+s xSdKnHy0Fe+IGP4Mry/K0VRYkEee/VBJr2vushdYqGxveelaPpGPkPOQLrJXvdpN Nve1Sor+Xdcac+2x1qPpz6pzMkraOC45aTuBFqQ49EUJ+cPtSxEsExzGCEgbQsGV X1qa188F/1UqggFtVDV5jg9JAyZvqooewEZNnrD3kgedizWcKwdXRMMIMdAynIzy RFjctwseDB7+4ZNk7FIBmVSuiTnHfVI29TKAn3HOhRNO7pg0zAF7UXlMfAdNQHeL 0IT840DauQCC2LSum0LITKqwoFjOriPwCaAsxweK1jBl/Knvlx9B/N4aEHZBZRjl SZX+Dq6b9n5czEHB2SYri6CtbY9J919vcq8dfZb6kgoUVQu72OwLcHin2IEqK02E tQH+Nv0ACSDOGJduWk760WgTNs7WqACWaCZ6IGkoIx/b7pzMVVV4dziKPPJLNHmE Un5WqRwmhGL16V/fXZnnQN3tgZPIx7XZn+4eOuhm7H9msGmoclbLpNDmI/MUc8B/ mo6YoaPoZK1Sq9JufBuFeleThsGbem4ZoTadU/a1mJ4Ly60MuOI= =D7te -----END PGP SIGNATURE-----
News
Recent news
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 To date our server seems vulnerable to Spectre variant 1 in certain conditions and to Spectre variant 2. Paranoid Secure Hosting has applied workrounds to make exploiting this vulnerabilities harder. For now Paranoid Secure Hosting keeps monitoring the situation on the how and when in the coming years it's possible to fundamental address this security issues with hardware replacements. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJaqW/oAAoJEEJniAaT0TKe9XMP/1oPOZHZx1wooIXiquSrDtPx HJtae2GW8AmszHwP5FuE46iHPgr6dSeo30RLXaDxumEMQuMp4rIi8bk//mXOemCD 2PjDYls/4y7kbbnYq2VcG9VW4HJf66GAJjtG5UdYc6E7DOczgsDMVPjTj1cKEMaT T+j+tVNamdif6DFJsrazYS8j76dXwyEW7J1TKf1KVUK+MF2Z8QtSysTgy1Qb0fR2 Tqh8fqI4xCJpqoiqMlIDjE0MnU8McR2oI5307q3/1quom6AVIPsinvogi+U1IzM2 mYOJ0OpYQg8YQTzD65JmdGgV5DoXhWyeC/69B+l1etA+0CdwxtI0O5IjlCkc2V4M SC/1+K1VbM9s7cYosCqizCKH8WorICIdZwcnn70BuWoutDlBhuKlH6vq2s0PzFCg CGufsjhzmgMqhQAOxbGyFGTCqhQvgIgbTTtfTAT3WhVqha/pg6VbE+sAq3rw8onC qBZHUbq9FYO8jXWHIphG2tykmRQw55KtUwGh0bDAMH31KUVXxGMrS41EP0VSqcYY 3IM2ADJAw+gGyR1IWgC3hT9GbIhyGNT+G4pthLrqLXeQk3eqCVyFTFqRzD4gmY43 f2F6B3NyQB6dqGvzql8BfIe6HQcGkddgLVrTjNrLRJj8Duv5b7+FUDssFqmNZuka Edr5SEn1ryH4xp2T2Oe+ =C8MQ -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 A security issue has been discovered in CPU hardware design known as Spectre(variant 1). Our server is also vulnerable to this hardware design issue in a certain condition. Because we do not have enabled this option(eBPF JIT on) it seems our server is not vulnerable for now. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJaYG0mAAoJEEJniAaT0TKe6s4P/1vrSqx/2iUCA9orPpp59fHY j4Zd75/mu3EKPq9WLThwV+PekLklXlvwu7NsZgRtBDY2/gWvCH9Tfog2CGAkvF3E foyum6YzROlQIp1E/RcIWRm0vb9VuYHA/p62ykJEgtBO2eRASSygkJCUh/lMLG4u CqCh5Si4N+fjq5zcK4cwwzPaPaXH+gX+FX/zvHh/E5Fg7AnKaw1J8RUVbeT+tJ2V qYnGV2ddO2kWxWkyb/FeypgeW5OwI+/JnR6pAp4dJU7lIXuoz4jdbt5m4SEE9nS6 WWw7aOsIOksJrG91LN0cyI+etOTkqU8NWWS+7oIiiZj5jZJxNYJa7jGWCckemGS1 rXLgNf+ExIy4QAh56ZPNxA9BSLs5XEbCxXF2uUOYBb2O3/0VnpJHSznS+hLb4Et0 dISCHomBUNHswnykleXsLWDeQ+CTyk93PY/ZaZcdjfS1CQ635eQ+XUEb1PLtbObo TIe9yW2XLWwyQwcVDz+QiEQD59hAxVcCY0MXBgTq3+zBBwdNi3zw41gTGBeNP4WK 8i08cXrOShpNxQI5oz7qHyE4ck1J/oDlRZkdD5jXJzJ8bZqrse7hkp0w2Lj2ACGR dHnEZgXbMd968dMkOtBZjC/1n8PnicYWRRWiy5m00xVWwf/4gGtFKrmZbv8Mw6FS 8yE3edWPi5cxti3zGOXJ =mYLc -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Paranoid Secure Hosting OpenPGP key roll over. The old OpenPGP key with Fingerprint: C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2 Short Key-ID: 9A1ECAD2 has been expired on: 2018-01-01 12:00(UTC) and will now not be used anymore. The new OpenPGP key will have with Fingerprint: 7637487CEB21CFBF21AA448B4267880693D1329E Short Key-ID: 9A1ECAD2 will we used from now on. This new OpenPGP key will be valid till: 2021-01-02 12:00(UTC). -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJaSV9eAAoJEED3uG6aHsrSFEUL/06KwNxMTwJ3644Bnz8wISUk AbZT/AL4hMSEBxKfGMx2NroSLIUWqXaInEG9GqcE4bkiKOsTV3HwwIUMKavuri0y hQpPBGAXqJZcfsDNbAjrXugtrodYxjeLDYB8ermsLZgW9/h0wtLO/w2M++sSwS1X OKMPadD2ueTMF/ZnkhDXpKWfjsrB/fAT+/XJUQVwg9h5AKAV+afGite6vyqpkaUT jNq0e710ubISnM/i8onPpU+jZz8w9fB1VTrO2A8NpaCH3O9aGXJ3f1fWMT7khm6L m6XvoWBeI/+Rxw3jMMOlkH9CpzComDupLlFXTn2FvQuMB23BgluOUzWApun/tx1h D25OKY9lVyhPgBFZHRvWhPerfsbSNmBDvPcLqZZAiOXnjDekG3g4Zz7Urm2DIR3H +1SB8KaHALlrHJWdg3A6BI6f/7I1NlbCREwxaE3IfRN33BBaUV5TDNCVI4iKJ2Ju EPubebc8ltlbpVV00/IBZh+qAk0keWhGh3gb6u1kSQ== =xr7y -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Due to a accidentally disconnected network cable a downtime occured from: 2017-05-26 16:02 (UTC) till: 2017-05-26 16:25 (UTC) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJZKe/NAAoJEED3uG6aHsrSBqwL/iOH7zgj5srp82DJDI5cE9oT uX/R/X4T9K1qEzjLWZuhQ/nhNEzJiTbw5kOxiNamTW1rgEbhnNPLBjkM1s+vQ4C+ MSTxLhos1py0TLIwmtEzZP71WwCeF2uulSI4nHxEg+06dD5OEPq7hlVnpDPFnFsb eK1XNYic0YIdBzhAHEMvKWGYn8jkuJm0A85JCI1TG+tqbodxxbd/4MNpz4hiKfgA glOqzRxMbo/XfF5KPMnAQA+9CbvwryPEG6cM/3OrJcuDcR/eRtKgszrFOVfagf1D 4d2cZnS1rkanHmj//O4F2dH20Y6dtN41HN6hxyWU8XvtwZZXBSXhWqfJ/SuchC4F eFQCeFwvPA1C0UVbfD/e005h699qiwPEkje7ZVb5XtKCswhCv/QX5HbuM1yHGxQs HXC9ZUlS3/aCNkC9ce17/hGkAfyrmf5ItHLSGG/i4ue0s9MTgVk1f1CedCgD2znb lAYDvrTcJPqTMwDH3QVzex1dpSaYZSai2ky4xTYtFg== =ab5C -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Because of the recent event that Paranoid Secure Hosting lost it's .tk domain and because Lets Encrypt CA is replacing the need for the Paranoid Secure Hosting CA use. Paranoid Secure Hosting CA is going to quit operations before 2018. - From 2017-02-16(YYYY-MM-DD) only (the FQDN)hosting.d9ping.nl is allowed to be signed with the Paranoid Secure Hosting CA root certificate to visit the Paranoid Secure Hosting website over https. All other certificates that used to be signed with Paranoid Secure Hosting CA root certificate are now not allowed to be renewed anymore. So all website's that used the Paranoid Secure Hosting CA certificate for https are now required to switch to a different CA. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJYpH4pAAoJEED3uG6aHsrSjJ8L/2GyagY8pReKvos5ATcfDhfk bf4KYxRMI9WVqBANkORbM9Y4vz/Qmk0UMkRMHyTUHqvAb3n4S+4/r7bPvGuRYpMq LXe8m02utJzw0253VOzz53Y13IGJlnFloc43WpiJm5bU7yTEgEDdqXka1eK1o0dw OR/tKpuUEYVqXA0icPHoyIwsfc4/mH1wAlx3hJggKgJbN3quqAyXJRABDFYr0/Yh 8icWuCRhjrgpQlqg9YYvz3HwXJNv0r8rBeNv6yBARw+vlaopJ2/7ZJdFoBCovv6c DX5oGIR2hyOo+ENDNfGfDSxChUvOfnddGWZNpullx5nGGtOXPCe84AQwkpolpNRy HXPd38dgX8wVHGBnMDhubiXkjS2+TYbQixoKZJ7ttpnpXIMswiWs9isKdlkhD2C3 w3cvhlMNqOHBpjJwrZYVBoamLQ6t5/bIqeFRZ5h3TkB+3Zsw2KJmyR1lYm1f32c1 PoGYOU3xOa8WgGQp2Ev5qNidtp8+fNmp2/5Ew16AIQ== =Lhx4 -----END PGP SIGNATURE-----