forked from Silverfish/proton-bridge
badssl got a new TLS cert last week. We need to bump the pinned key.
This was generated by exporting the TLS cert at rsa4096.badssl.com with
the Chromium browser and running the following program on it:
```
b, err := os.ReadFile("badssl.pem")
if err != nil {
panic(err)
}
block, rest := pem.Decode(b)
if len(rest) > 0 {
panic("unexpected rest")
}
cert, err := x509.ParseCertificate(block.Bytes)
if err != nil {
panic(err)
}
hash := sha256.New()
if _, err := hash.Write(cert.RawSubjectPublicKeyInfo); err != nil {
panic(err)
}
fmt.Println(base64.StdEncoding.EncodeToString(hash.Sum(nil)))
```