badssl got a new TLS cert last week. We need to bump the pinned key.
This was generated by exporting the TLS cert at rsa4096.badssl.com with
the Chromium browser and running the following program on it:
```
b, err := os.ReadFile("badssl.pem")
if err != nil {
panic(err)
}
block, rest := pem.Decode(b)
if len(rest) > 0 {
panic("unexpected rest")
}
cert, err := x509.ParseCertificate(block.Bytes)
if err != nil {
panic(err)
}
hash := sha256.New()
if _, err := hash.Write(cert.RawSubjectPublicKeyInfo); err != nil {
panic(err)
}
fmt.Println(base64.StdEncoding.EncodeToString(hash.Sum(nil)))
```
* Renaming GUI, CLI, no-impact config.
* License header and documentation rebranding.
* Rename app title and vendor. Impact: manual install
* Migrating mac keychain and launch on startup.
* Fix linter and linter renaming