[tor-commits] r25056: {website} explain that linux users are winners (website/trunk/docs/en)

Roger Dingledine arma at torproject.org
Sat Sep 10 11:38:28 UTC 2011


Author: arma
Date: 2011-09-10 11:38:28 +0000 (Sat, 10 Sep 2011)
New Revision: 25056

Modified:
   website/trunk/docs/en/verifying-signatures.wml
Log:
explain that linux users are winners


Modified: website/trunk/docs/en/verifying-signatures.wml
===================================================================
--- website/trunk/docs/en/verifying-signatures.wml	2011-09-10 11:13:47 UTC (rev 25055)
+++ website/trunk/docs/en/verifying-signatures.wml	2011-09-10 11:38:28 UTC (rev 25056)
@@ -174,17 +174,22 @@
     <h3>Linux</h3>
     <hr>
 
-    <p>For <b>RPM-based distributions</b> you can manually verify the
-    signatures on the RPM packages by:</p>
-    <pre>rpm -K filename.rpm</pre>
+    <p>Most Linux distributions come with gpg preinstalled, so users
+    who want to verify the Tor Browser Bundle for Linux (or the source
+    tarball) can just follow along with the instructions above for
+    "Mac OS X".</p>
 
-    <p>For <b>Debian</b>, you should read the instructions on <a
-    href="<page docs/debian>#packages">importing these keys to
-    apt</a>.</p>
+    <p>If you're using the <b>Debian</b> packages, you should read the
+    instructions on <a href="<page docs/debian>#packages">importing
+    these keys to apt</a>.</p>
 
-    <p>If you wish to learn more about GPG, see <a
-    href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>.</p>
+    <p>If you're using the <b>RPMs</b>, you can manually verify the
+    signatures on the RPM packages by <pre>rpm -K filename.rpm</pre></p>
 
+    <p>See <a
+    href="http://www.gnupg.org/documentation/">http://www.gnupg.org/documentation/</a>
+    to learn more about GPG.</p>
+
   </div>
   <!-- END MAINCOL -->
   <div id = "sidecol">



More information about the tor-commits mailing list