[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] r25056: {website} explain that linux users are winners (website/trunk/docs/en)
Author: arma
Date: 2011-09-10 11:38:28 +0000 (Sat, 10 Sep 2011)
New Revision: 25056
Modified:
website/trunk/docs/en/verifying-signatures.wml
Log:
explain that linux users are winners
Modified: website/trunk/docs/en/verifying-signatures.wml
===================================================================
--- website/trunk/docs/en/verifying-signatures.wml 2011-09-10 11:13:47 UTC (rev 25055)
+++ website/trunk/docs/en/verifying-signatures.wml 2011-09-10 11:38:28 UTC (rev 25056)
@@ -174,17 +174,22 @@
<h3>Linux</h3>
<hr>
- <p>For <b>RPM-based distributions</b> you can manually verify the
- signatures on the RPM packages by:</p>
- <pre>rpm -K filename.rpm</pre>
+ <p>Most Linux distributions come with gpg preinstalled, so users
+ who want to verify the Tor Browser Bundle for Linux (or the source
+ tarball) can just follow along with the instructions above for
+ "Mac OS X".</p>
- <p>For <b>Debian</b>, you should read the instructions on <a
- href="<page docs/debian>#packages">importing these keys to
- apt</a>.</p>
+ <p>If you're using the <b>Debian</b> packages, you should read the
+ instructions on <a href="<page docs/debian>#packages">importing
+ these keys to apt</a>.</p>
- <p>If you wish to learn more about GPG, see <a
- href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>.</p>
+ <p>If you're using the <b>RPMs</b>, you can manually verify the
+ signatures on the RPM packages by <pre>rpm -K filename.rpm</pre></p>
+ <p>See <a
+ href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>
+ to learn more about GPG.</p>
+
</div>
<!-- END MAINCOL -->
<div id = "sidecol">
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits