-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 This page serves as informational purpose for any news related to Paranoid Secure Hosting. All updates on this page are signed with the Paranoid Secure Hosting OpenPGP key. The binary OpenPGP public key can be imported from (for ascii armored add .asc to url): https://d9ping.nl/.well-known/openpgpkey/hu/t5s8ztdbon8yzntexy6oz5y48etqsnbb Fingerprint: 7637487CEB21CFBF21AA448B4267880693D1329E Algorithm: RSA 4096 bits Long Key-ID: 4267880693D1329E Valid till: 2027-01-01(YYYY-MM-DD) Previous valid till: 2024-01-01(YYYY-MM-DD) And previous valid till: 2023-01-01(YYYY-MM-DD) And also previous valid till: 2021-01-01(YYYY-MM-DD) Any message before before 2018-01-01(YYYY-MM-DD) 12:00(UTC) were signed with our olds Algorithm: RSA 3072 bits Fingerprint: C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2 Valid till: 2018-01-01(YYYY-MM-DD) 12:00(UTC). -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEdjdIfOshz78hqkSLQmeIBpPRMp4FAmhFs7oACgkQQmeIBpPR Mp7NbxAAiPmbkcX1Lgpc4HR+BJ39TccjqVzofQXFur7cBBu2VkbzEiFAhzbDcEhF mAoGDHPmbj9ZO46VLDmTESjOQZ+yAI9yQlfrYg2pBqXXV7ShMmcxU8BBUv0vLvxP X6NSECezpqCp4bUmoy8ybKOC+uWbgp8foces+Xv+lfrGMWvrNB7F62hzC/UMyBZg cRJ11XZPLcta11CqQ4sAjeOccurUspxhYbhpglfrvusvg+8szd+VOK6Wr4CBmTjz ORlHAp1d8XVcu9axgaibsN1rbLjkcwdxA2R5xzP2UEkMCebKGYuIJg92NeJ5q874 FJTXcm1haCMOIfvkPwkb0Gg76ohqsEErlYLy2Q8SRarYdlbzCKkp2KvXvj5axiKU 1etGu3n1HR3sCmIoWtLvHPmrnDDl94+SwszefQm5r4FtiXFUckaiTIsMAjY6CNpn +IsVRF6ITonQCOw+tQ89nDbpTJ0BVjgA3Xh+UdebCe0GrP+korjD6xNCxndGwQKf dPoMsP7DJwT8Ix24y1ZO4h78UfdVevMEgvyynJVpTrzddhO89WtqhfV5rkWTynNm N4sKPmJu+7AIjaAxnhX3zuljSIikoY49LRprFiXVUsC/oHzPeQZjBvPqow5mKg0A ban/KjDeTnQuCULQm3VgK1VlFMpCt4skLJByfahxRbVRQZO6ODw= =dbpk -----END PGP SIGNATURE-----
News
Recent news
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 There will be scheduled maintenance by the upstream provider from 2014-12-09 23:59 (UTC) till 2014-12-10 5:00 (UTC). During this time window connection distributions can occur or connection may be slower than usually. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJVHSAMAAoJEED3uG6aHsrSp/EL/AocYFL8cLiD1jw+EVX3jKn4 3mjQG5vNL+eCq5TVs/UrWeJ/nEVL2py6dE/C6N1BvImOj+so9BdfvFA1uoyIbofE 6/GFSl9/80O9oVygVJOlcjzf+1EY2jAb2QVIrdqn/KJ5276vgLY+GZSAS+QUkTt0 ngnAE+qdPtY2zo0OuliYG1S6Sl+sSGikbHC1wLJMl5w9MqRJ4IrVe2XrJS6sqPm5 c79N1CuMOHjxwTYdcMRI69Bxdn7hReF+04pgnLl31Bmjr/X+9x/4uj0/2DDY2Q2D z//6sl50AZw5CuYCgFJdTt3QZAfhpfx3rObN7n8Sndx7t3CZ3eIpj0bsZ9B3csij JoaPANIbTgYPdukE3EoKI1VVSMvodq1DCJ7Nu4KhT7VqpB0YAO94HS7pcef6T7o3 9nzKJ2k28onPzctVDX3XbKyznxzDdyxUEAWOP6T1ktSDxV3yM3mym6+KFXKbq7b9 aJ65E2ZHuStlTvTcGb7J+XLwcl3M4DS1i4//WYm09Q== =YDnz -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Paranoid Secure Hosting has fixed security issue CVE-2014-8350 that is caused by the use of Smarty template engine. This security issue could be abused for PHP commandline execution from an internal threat. We have patched the issue and exploiting CVE-2014-8350 should now not work. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 iQGcBAEBCgAGBQJUZ4p3AAoJEED3uG6aHsrS0PYMAJIzsoI3KLyb0DEwuNMafOfR Q61fabhM/zw2UQUF4Lw1KSMwzgfT9FTVdZ23uCOtrlm6XFw5b2ACy5cSF4skKdQj jmMtiJA/nrW7L4xIdqrY6k5T3jToCUbu4Vjglu8D4wIr8wAbhg0OVup6V4Lokkes ek0iS8s70ug0I97esgiHCQnhfIsUn5NdRFJA1cILvMGLD/45gbO5Mj2nfARrlZOX T1bIPztredA2OlVFIesfl87KczoKirj1gihSslB/XPPs8cC7W4DCSkF/JU8F7K8j mnKX7n/Z0FC6HQE2ekR5C+HwC9YtcrBBGzcIAXmNKyRjOkW99tMwa+zpLSfILco6 xGFyfd13raR5+YeFulptrVvP5BYW7HaQ/ONnUjHhbdre9QdOy+n2rYSLcwaNPkor EYiHgS/0ZSmMopasGRyju2vtV28xnWXrdJWFrdQZtgeezIIhLcTPRuTGKE496aYD 58WGMuvYz2OuaR2qjmAyiyltfOGLyOjW+w3Y5vPUDQ== =uI4O -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Paranoid Secure Hosting is aware of a critical new issue with SSL 3.0.(CVE-2014-3566) Paranoid Secure Hosting want to clarify that Paranoid Secure Hosting does not and have not supported SSL 3.0. This is because we need use TLS instead of SSL for supporting multiple secure sites on the same public ip and SSL 3.0 cannot do that. We recommend all web users to enable TLS 1.1 and TLS 1.2 and make sure you always try to use the latest TLS version 1.2 due to other major issues with TLS version 1.0. Paranoid Secure Hosting does still supports TLS 1.0 but this is only because so many web users still do not have TLS 1.1 or 1.2 enabled in their webbrowsers. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 iQGcBAEBCgAGBQJUPkgyAAoJEED3uG6aHsrSh7EL/jbM4ENa0uYZfThitty5q63l Xvum/YLFDeXamOtq9QMHJPqjxZsWywrPlzyb4rNjGwvUxfrWDvXLRuA0y8t3QlLg Kz7drApgBQ5U+9Hlq42ObqGlEDgyivEMMO2vlVZMyoM+fQjo3v8i9M5hudGldjzj 42kZohcIxNWzT1CUabwfeDLFMXKkDiG5YmIaVvr7lkZduUunKct8eIGVcjDUjtkW iIkmI2EwMvUMBENMDcI51ZgupJawHVDtDOOrpaa1Echd0tnJ28f+BQvIHdmzWvjA RFEWF8NBI28HiztAjCC5Rz+DHUQAEdbJ41FZqa75S9xWQ19lVd77IoOTYoF3hezd +5jTqvdei72OaqyYDZ6Y92YqMjuEsk/xwzO0yb5TndVGO/BrwsFifGkkZ5jg0GKQ DaU1D+mB1cKXSxdFtGVfPk0vnLHRl31RLIjIoi9hOP+Xn/KrUyjl9Y3VX7bLaAke ZOPJiWMQFx40mlpdmOflgn6vLA24kqDgjTghcTvyHg== =Qcfa -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 There will be scheduled maintenance by the upstream provider from 2014-09-24 23:00 (UTC) till 2014-09-25 5:00 (UTC). During this time window connection distributions can occur or the connection is slower than usually. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJVHSLEAAoJEED3uG6aHsrSeXYL/2rIHsVTPBQm6TOUWDMYSvkA pvIVJcLWj0kBUZkGSemMsO+OGLKJDz/LYO9L/XCRyEbjEDynWPc2C7jJpwzIU5+/ 3OWvfLmrgy9+Z5lv1/kQ3gigpcG02VHJWU0Qvkhbz58HDcr6tVhBmCD80vgPQ1Iq FJYS0sChs9qd/n871W/1a+C3JtKpSvvjWkWDQhlt8GUI0RrtTUqg3Uta9CHxEK0/ rtFyMk5HIUjeHgktPssj4F+5W5tWKrjqwVCaAfHq4NVdlwvt9U/DztcEVFOCecM0 1cqJuIHT/t7OOzKnJVaZAdMTbQQECCwCjLQAFAtzFAVUJZJgeDVrAYqlvhNBG1QO ClTvDB7DsaxHnD6WRho8R4eJsoDpPFAxhK8nPLN6io9r8zmM0ToqottC8vtvs2cJ LGxSo6UR7u5+L/T9JfGM2nl9bEvrY0gzUz15+l8qujHWxKtU5F2myPfdYMEtoPzk wWlZmsO8ZWBWmvh5umydxsVwO2PF7FOYGC9wI35mgA== =RC3j -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 There were multiple downtimes due to router failure. The first downtime occurred from 2014-07-29 21:41 (UTC) till 2014-07-29 21:56 (UTC). And another downtime occurred from 2014-07-30 11:12 (UTC) till 2014-07-30 11:28 (UTC). -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGcBAEBCgAGBQJVHSSBAAoJEED3uG6aHsrSQsML/2Nz7Q6UMvkIuy47v7vEoQ4u 4ycQTiMtZ6XHvd8LfTsXD0kb4op20xDY4lEkPBT7OkRZnYqsRZjMT5qs9VsxP4ho QxQYYVXfvwvYCqnz5ceyUo7Mt4Mlijmx3gnM8faPl/nHBloGkY5kliuVzkIqHo3c tZk/Pmyk7JQeX40Qmxb/ZkNtxi1gzYZ8ZmteO7HBw0etZTRzlV+jxONKr8Y3wdNW lG+r10TX1FNVVt03i3/OCKaOz/0rLpWTFlZ8shGqcgnxn4pWHgMjLc+PLWon1qjl Sik5dgXR//s6LM2KodZ3NF4LtdwS7p7fTYJ9G9aoNhnqgiFQPeZRlrSHkYhLr9GD jS0xaHyOk7T1DaZVYdy8BNiK/HLEoboRaBH43PSrUfFOptJ1yXZdf7W5Dqlnm/N4 MEQHRqatACYnF+37tPFK4hCMVtiHExd+YAcDnE5kAIwYYlEZoJJa6JgKvGx/RAVI LHHwHqK83GTvuM1fbrRKUaPdzaJGNm6jguhWg1gXhA== =Z9Jy -----END PGP SIGNATURE-----
