v0.13.2. Before installing, you can cryptographically confirm that the artifact you are using was built by SuprSend and has not been modified in transit.
Before you begin
The SuprSend Java SDK ships with two independent trust signals:- Maven Central GPG signature — every artifact published to Maven Central is signed with SuprSend’s GPG key. Maven Central requires all publishers to sign their artifacts, and the
.ascsignature file is published alongside every.jaron the Maven Central file server atrepo1.maven.org. - SHA-256 checksum + GPG signature on
checksums.txt— every GitHub release also publishes achecksums.txtlisting SHA-256 hashes of all release artifacts, signed with the same GPG key. This mirrors the flow used for the Python SDK and CLI.
Prerequisites
You need GPG installed.- macOS
- Linux (Debian / Ubuntu)
- Windows
Path A — Verify a jar from Maven Central
Use this path if your build tool (Maven/Gradle) resolved the dependency from Maven Central, or if you want to verify a.jar downloaded directly from repo1.maven.org.
Step A1 — Create a working directory
- macOS / Linux
- Windows
Step A2 — Download the jar, its signature, and its checksum from Maven Central
Usecurl to download directly from the Maven Central file server. Do not download through the Sonatype UI — it does not serve .asc files correctly.
- macOS / Linux
- Windows
Step A3 — Verify the jar checksum against Maven Central
Maven Central publishes its own SHA-256 hash for every artifact independently of SuprSend. Verifying against it confirms the file you downloaded matches what Maven Central is serving — using Maven Central’s infrastructure as the source of truth.- macOS
- Linux
- Windows
Step A4 — Import and trust SuprSend’s public key
Download the public key from the SuprSend GitHub release, import it, and mark it as trusted. The second command sets trust non-interactively so the final verify output is clean with no warnings.Always download
public_key.asc directly from the official SuprSend Java SDK releases page. Do not copy it from mirrors or third-party sources. Before trusting the key, cross-check the fingerprint 2E736EA7E36AB94C883A490C5261B38640D3A94D against the one published on the releases page.Step A5 — Verify the GPG signature on the jar
Good signature [full] confirms the .jar was signed by SuprSend’s private key and has not been modified since signing.
Path B — Verify a jar downloaded from GitHub releases
Use this path if you downloaded the.jar from the GitHub releases page and want to verify it against the signed checksums.txt.
Step B1 — Create a working directory
All files must be in the same directory for the checksum step to work.- macOS / Linux
- Windows
Step B2 — Download the jar and verification files
- macOS / Linux
- Windows
suprsend-verify directory should contain exactly these files:
| File | Description |
|---|---|
suprsend-java-sdk-0.13.2.jar | The SDK artifact. |
checksums.txt | SHA-256 hashes of all release artifacts. This is what gets signed. |
checksums.txt.asc | GPG detached signature over checksums.txt. |
public_key.asc | SuprSend’s GPG public key. Used to verify the signature. |
Step B3 — Import and trust SuprSend’s public key
Before trusting the key, cross-check the fingerprint
2E736EA7E36AB94C883A490C5261B38640D3A94D against the one published on the SuprSend Java SDK releases page.Step B4 — Verify the signature on checksums.txt
Good signature [full] confirms checksums.txt was produced by SuprSend’s pipeline and has not been tampered with.
Step B5 — Verify the jar checksum
- macOS
- Linux
- Windows
Add the dependency to your project
Once verification passes, add the SDK to your build configuration:- Maven
- Gradle
Full scripts
Path A — Maven Central
- macOS (Apple Silicon / Intel)
- Linux (x86_64 / ARM64)
- Windows
Path B — GitHub release
- macOS (Apple Silicon / Intel)
- Linux (x86_64 / ARM64)
- Windows (x86_64 / ARM64)
Add the dependency to your project
Once verification passes, add the SDK to your build configuration:- Maven
- Gradle
Reference
Available release artifacts
Available release artifacts
| Artifact | Source | Description |
|---|---|---|
suprsend-java-sdk-{version}.jar | GitHub / Maven Central | The SDK jar. |
suprsend-java-sdk-{version}.jar.asc | Maven Central | GPG detached signature over the jar. |
suprsend-java-sdk-{version}.jar.sha256 | Maven Central | SHA-256 hash of the jar, published by Maven Central. |
checksums.txt | GitHub | SHA-256 hashes of all release artifacts. |
checksums.txt.asc | GitHub | GPG detached signature over checksums.txt. |
public_key.asc | GitHub | SuprSend’s GPG public key. |
Security model
Security model
SuprSend’s GPG signing private key is held exclusively by the automated release pipeline and never leaves the secure signing environment.
public_key.asc is the public counterpart — it is published openly with every release and carries no risk of compromise.The key fingerprint is 2E73 6EA7 E36A B94C 883A 490C 5261 B386 40D3 A94D. You can cross-check this against the fingerprint published on the SuprSend Java SDK releases page to independently confirm the key’s authenticity before trusting it.Maven Central independently requires all publishers to sign their artifacts with a GPG key registered with a public keyserver, and publishes its own SHA-256 hash for every artifact. Path A therefore gives you three independent signals: Maven Central’s own checksum, SuprSend’s GPG signature on the jar, and the key fingerprint you can verify out-of-band.