diff --git a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/sol/transfer-token.md b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/sol/transfer-token.md index 378b270..77e44e2 100644 --- a/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/sol/transfer-token.md +++ b/quorum-vault-system/src/generated-documents/level-2/fixed-location/operator/coins/sol/transfer-token.md @@ -50,30 +50,6 @@ 1. Retrieve Ceremony SD card from High Visibility Storage and plug it into the air-gapped machine -1. Verify keyring data from the Ceremony SD card: - - 1. Import keys into the system - - * `gpg --import keys/all/*.asc` - - 1. Plug in the operator's smartcard, and ensure it is loaded: - - * `gpg --card-status` - - 1. Print the list of trusted keys: - - * `sq-wot --gpg list` - - 1. Repeat for every operator, ensuring all keys are cross-trusted. - - 1. Terminate `gpg-agent`: `killall gpg-agent` - -1. Verify all signatures for the workflow data: - - * `for file in .*.sig; do echo "Verifying: $file"; gpg --verify "${file}" ""; done` - - * Ensure that the script doesn't output any "WARNING" messages to the console. If it does, abort the ceremony and initiate incident response. - 1. Start Keyfork using the relevant Shardfile: * `keyfork recover shard --daemon /media/external/shard.asc`