A standalone binary. No installer. No telemetry. The only client software for FGSP. Verify the signature before running — every release is signed by the operator's release key.
The same binary semantics on every platform. Cross-platform determinism is a build-time guarantee — your Drive A bundle works the same everywhere.
A Tor-only mirror is published at the same time as the public release, for users who do not want their download visible to a network observer. Both mirrors serve byte-identical binaries — verify the signature against the same release key either way.
# mirror address (will be published at first release): # http://<onion-published-here>/download/
Every Navigator release is signed by the operator's release key. Verifying confirms the binary is the one we shipped and has not been tampered with on a CDN, a mirror, or in flight. Skipping signature verification weakens the threat model considerably — do not skip it for high-stakes work.
# 1. download the binary + the signature file curl -O https://fgsp.io/download/fgsp curl -O https://fgsp.io/download/fgsp.sig # 2. import the operator's release key (fingerprint published here at first release) gpg --recv-keys <FGSP_RELEASE_KEY_FINGERPRINT> # 3. verify gpg --verify fgsp.sig fgsp # expect: "Good signature from FGSP Operator <release@fgsp.io>" # reject anything else.
Three things happen next, in order: