Author: arma Date: 2011-09-10 11:38:28 +0000 (Sat, 10 Sep 2011) New Revision: 25056
Modified: website/trunk/docs/en/verifying-signatures.wml Log: explain that linux users are winners
Modified: website/trunk/docs/en/verifying-signatures.wml =================================================================== --- website/trunk/docs/en/verifying-signatures.wml 2011-09-10 11:13:47 UTC (rev 25055) +++ website/trunk/docs/en/verifying-signatures.wml 2011-09-10 11:38:28 UTC (rev 25056) @@ -174,17 +174,22 @@ <h3>Linux</h3> <hr>
- <p>For <b>RPM-based distributions</b> you can manually verify the - signatures on the RPM packages by:</p> - <pre>rpm -K filename.rpm</pre> + <p>Most Linux distributions come with gpg preinstalled, so users + who want to verify the Tor Browser Bundle for Linux (or the source + tarball) can just follow along with the instructions above for + "Mac OS X".</p>
- <p>For <b>Debian</b>, you should read the instructions on <a - href="<page docs/debian>#packages">importing these keys to - apt</a>.</p> + <p>If you're using the <b>Debian</b> packages, you should read the + instructions on <a href="<page docs/debian>#packages">importing + these keys to apt</a>.</p>
- <p>If you wish to learn more about GPG, see <a - href="http://www.gnupg.org/documentation/%22%3Ehttp://www.gnupg.org/documentation/</a>.</p> + <p>If you're using the <b>RPMs</b>, you can manually verify the + signatures on the RPM packages by <pre>rpm -K filename.rpm</pre></p>
+ <p>See <a + href="http://www.gnupg.org/documentation/%22%3Ehttp://www.gnupg.org/documentation/</a> + to learn more about GPG.</p> + </div> <!-- END MAINCOL --> <div id = "sidecol">