1 2
# This file should contain fingerprints of revoked keys, e.g.: # SHA256:cUUr/dCcTe9sJwpJXdbGB1EhNshu0o/7M0XHgMc4mZ0