diff --git a/_i18n/ar/resources/user-guides/verification-allos-advanced.md b/_i18n/ar/resources/user-guides/verification-allos-advanced.md index 12438eff..5f176c58 100644 --- a/_i18n/ar/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/ar/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ ### 2.1. إحصل علي مفتاح التوقيع -علي ويندوز أو ماك إذهب إلي [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc) لتحميل المُفتاح المُستخدم في توقيع الملفات وقم بحفظه بإسم `fluffypony.asc` في مجلدك الرئيسي. +علي ويندوز أو ماك إذهب إلي [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc) لتحميل المُفتاح المُستخدم في توقيع الملفات وقم بحفظه بإسم `binaryfate.asc` في مجلدك الرئيسي. في ليُنكس يمكنك تحميل ملف مفتاح التوقيع من خلال الأمر التالي : ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. تأكد من مفتاح التوقيع -في جميع أنظمة التشغيل ، تحقق من بصمة `fluffypony.asc` بإصدار الأمر التالي في سطر الأوامر : +في جميع أنظمة التشغيل ، تحقق من بصمة `binaryfate.asc` بإصدار الأمر التالي في سطر الأوامر : ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` تحقق من تطابق البصمه بالتالي : ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` إذا كانت البصمه **صحيحه** يمكنك المُتابعه. -إذا كانت البصمه ** غير متطابقه ** **لا تُكمل** بل قم بحذف ملف `fluffypony.asc` وإذهب إلي [فصل 2.1](#21-get-signing-key). +إذا كانت البصمه ** غير متطابقه ** **لا تُكمل** بل قم بحذف ملف `binaryfate.asc` وإذهب إلي [فصل 2.1](#21-get-signing-key). ### 2.3. إستيراد مفتاح التوقيع من سطر الأوامر ، قم باستيراد مفتاح التوقيع: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` إذا كانت هذه هي المرة الأولى التي تستورد فيها المفتاح ، فسيبدو الناتج كما يلي: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` إذا قمت باستيراد المفتاح مسبقًا ، فسيبدو الناتج كما يلي: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -109,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt ### 3.2. تأكد من ملف الهاش -ملف الهاش موقع بمفتاح `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, الذي هو مفتاح فرعي من المفتاح `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (كما هو موضح في الناتج أدناه). +ملف الهاش موقع بمفتاح `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, كما هو موضح في الناتج أدناه. في جميع أنظمة التشغيل ، تحقق من توقيع ملف التجزئة عن طريق إصدار الأمر التالي في سطر الأوامر: @@ -120,13 +119,11 @@ gpg --verify hashes.txt إذا كان الملف صحيح ، سيبدو الناتج كما يلي: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` إذا كان الناتج يُظهر ** Good signature ** كما هو موضح في المثال فيمكنك المتابعة. @@ -144,21 +141,21 @@ Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 في Linux ، يمكنك تنزيل واجهه سطر الأوامر عن طريق إصدار الأمر التالي: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. تأكد من الملفات علي ليُنكس اوماك -هذه الخطوات لنظامي تشغيل لينُكس وماك. من سطر الأوامر إحصل علي هاش `SHA256` لملف التثبيت. كمثال سيستخدم هذا الدليل واجهه المستخدم الرسوميه علي ليُنكس , إستبدل `monero-gui-linux-x64-v0.12.0.0.tar.bz2` بإسم ملف التثبيت الذي قمت بتنزيله في [الفصل 4.1](#41-get-monero-binary). +هذه الخطوات لنظامي تشغيل لينُكس وماك. من سطر الأوامر إحصل علي هاش `SHA256` لملف التثبيت. كمثال سيستخدم هذا الدليل واجهه المستخدم الرسوميه علي ليُنكس , إستبدل `monero-gui-linux-x64-v0.15.0.1.tar.bz2` بإسم ملف التثبيت الذي قمت بتنزيله في [الفصل 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-gui-linux-x64-v0.15.0.1.tar.bz2 ``` سيبدو الناتج كهذا ، ولكن سيكون مختلفًا لكل ملف. يجب أن يتطابق هاش `SHA256` الخاصة بك مع الهاش في القائمة المدرجة في ملف` hashes.txt` لملف التثبيت. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.15.0.1.tar.bz2 ``` إذا كان الهاش **مُتطابق** يمكنك الأن فك الضفط والتثبيت. @@ -167,7 +164,7 @@ fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-lin ### 4.3. تأكد من الملفات علي ويندوز -من سطر الأوامر احصل على هاش `SHA256` من ملف التثبيت الذي تم تنزيله. على سبيل المثال ، سيستخدم هذا الدليل ثنائي واجهة المستخدم الرسومية لنظام ويندوز ، 64 بت. استبدل `monero-gui-win-x64-v0.12.0.0.zip` باسم الملف الذي قمت بتنزيله في [القسم 4.1](#41-get-monero-binary). +من سطر الأوامر احصل على هاش `SHA256` من ملف التثبيت الذي تم تنزيله. على سبيل المثال ، سيستخدم هذا الدليل ثنائي واجهة المستخدم الرسومية لنظام ويندوز ، 64 بت. استبدل `monero-gui-win-x64-v0.15.0.1.zip` باسم الملف الذي قمت بتنزيله في [القسم 4.1](#41-get-monero-binary). ``` certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 diff --git a/_i18n/de/resources/user-guides/verification-allos-advanced.md b/_i18n/de/resources/user-guides/verification-allos-advanced.md index 29a0b82a..7d1f4d8d 100644 --- a/_i18n/de/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/de/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc ### 2.1. Get Signing Key -On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory. +On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory. -On Linux, you can download Fluffypony's signing key by issuing the following command: +On Linux, you can download binaryFate's signing key by issuing the following command: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Verify Signing Key -On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal: +On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Verify the fingerprint matches: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` If the fingerprint **DOES** match, then you may proceed. -If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key). +If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key). ### 2.3. Import Signing Key From a terminal, import the signing key: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` If this is the first time you have imported the key, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` If you have imported the key previously, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity ### 3.1. Get Hash File -On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. +On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. On Linux, you can download the signed hashes file by issuing the following command: ``` -wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt +wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt ``` ### 3.2. Verify Hash File -The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below). +The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below. On all operating systems, verify the signature of the hash file by issuing the following command in a terminal: @@ -120,13 +119,11 @@ gpg --verify hashes.txt If the file is authentic, the output will look like this: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` If your output shows **Good signature**, as in the example, then you may proceed. @@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system, ### 4.1. Get Monero binary -On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** +On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** On Linux, you can download the command line tools by issuing the following command: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Binary Verification on Linux or Mac -The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` If your hash **DOES** match, then you are finished with the guide! You can extract the files and install. @@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary ### 4.3. Binary Verification on Windows -From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. diff --git a/_i18n/es/resources/user-guides/verification-allos-advanced.md b/_i18n/es/resources/user-guides/verification-allos-advanced.md index e18d9135..2847a11f 100644 --- a/_i18n/es/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/es/resources/user-guides/verification-allos-advanced.md @@ -37,57 +37,57 @@ Esta sección cubre la obtención de la clave de firma Monero, asegurar que sea ### 2.1. Obtener Clave de Firma -En Windows o Mac, ve a la [clave GPG de Fluffypony](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), que utiliza para firmar los binarios Monero, y guarda la página como `fluffypony.asc` en tu directorio de inicio. +En Windows o Mac, ve a la [clave GPG de binaryFate](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), que utiliza para firmar los binarios Monero, y guarda la página como `binaryFate.asc` en tu directorio de inicio. En Linux, puedes descargar la clave de firma de Fluffypony utilizando el siguiente comando: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Verificar Clave de Firma -En todos los sistemas operativos, revisa la huella de `fluffypony.asc` utilizando el siguiente comando en una terminal: +En todos los sistemas operativos, revisa la huella de `binaryfate.asc` utilizando el siguiente comando en una terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Verifica que la huella coincida: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` Si la firma **SÍ** coincide, entonces puedes continuar. -Si la firma **NO** coincide, **NO CONTINÚES.** En su lugar borra el archivo `fluffypony.asc` y regresa a la [sección 2.1](#21-obtener-clave-de-firma). +Si la firma **NO** coincide, **NO CONTINÚES.** En su lugar borra el archivo `binaryfate.asc` y regresa a la [sección 2.1](#21-obtener-clave-de-firma). ### 2.3. Importar Clave de Firma Desde una terminal, importa la clave de firma: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` Si es la primera vez que importas la clave, la salida se verá como esto: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " imported +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` Si ya has importado la clave previamente, la salida se verá como esto: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -108,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt ### 3.2. Verificar Archivo Hash -El archivo hash está firmado con la clave `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, Que es una sub clave de `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (como se observa en la salida abajo). +El archivo hash está firmado con la clave `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92` (como se observa en la salida abajo). En todos los sistemas operativos, verifica la firma del archivo hash utilizando el siguiente comando en una terminal: @@ -119,13 +119,11 @@ gpg --verify hashes.txt Si el archivo es auténtico, la salida se verá como esto: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` Si la salida muestra **Good signature**, como en el ejemplo, puedes continuar. @@ -143,21 +141,21 @@ En Windows o Mac, ve a [getmonero.org]({{ site.baseurl }}/downloads/) y descarga En Linux, puedes descargar las herramientas de consola de comandos utilizando el siguiente comando: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Verificación de Binarios en Linux o Mac -Los pasos para Linux o Mac son los mismos. Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Linux, 64bit`. Reemplaza `monero-gui-linux-x64-v0.12.0.0.tar.bz2` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero). +Los pasos para Linux o Mac son los mismos. Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Linux, 64bit`. Reemplaza `monero-gui-linux-x64-v0.15.0.1.tar.bz2` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` La salida se verá como esto, pero será diferente para cada archivo binario. Tu hash `SHA256` debe coincidir con el hash listado en el archivo `hashes.txt` para tu archivo binario. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` Si tu hash **SÍ** coincide, ¡entonces has terminado con la guía! Puedes extraer los archivos e instalarlos. @@ -166,10 +164,10 @@ Si tu hash **NO** coincide, **NO CONTINÚES.** En su lugar, elimina el binario d ### 4.3. Verificación de Binarios en Windows -Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Windows, 64bit`. Reemplaza `monero-gui-win-x64-v0.12.0.0.zip` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero). +Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Windows, 64bit`. Reemplaza `monero-gui-win-x64-v0.15.0.1.zip` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` La salida se verá como esto, pero será diferente para cada archivo binario. Tu hash `SHA256` debe coincidir con el hash listado en el archivo `hashes.txt` para tu archivo binario. diff --git a/_i18n/fr/resources/user-guides/verification-allos-advanced.md b/_i18n/fr/resources/user-guides/verification-allos-advanced.md index f382cad1..b4aca2f2 100644 --- a/_i18n/fr/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/fr/resources/user-guides/verification-allos-advanced.md @@ -39,58 +39,57 @@ Cette rubrique couvre le téléchargement de la clef de signature Monero, la vé ### 2.1. Obtenir la Clef de Signature -Sur Windows et Mac, rendez-vous sur [la clef GPG de Fluffypony](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), qu'il utilise pour signer les binaires Monero et sauvegardez la page sous `fluffypony.asc` dans votre répertoire utilisateur. +Sur Windows et Mac, rendez-vous sur [la clef GPG de binaryFate](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), qu'il utilise pour signer les binaires Monero et sauvegardez la page sous `binaryfate.asc` dans votre répertoire utilisateur. Sur Linux, vous pouvez télécharger la clef de signature de Fluffypony en tapant la commande suivante : ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Vérifier la Clef de Signature -Sur l'ensemble des systèmes d'exploitation, vérifiez l'empreinte de `fluffypony.asc` en tapant la commande suivante dans un terminal : +Sur l'ensemble des systèmes d'exploitation, vérifiez l'empreinte de `binaryfate.asc` en tapant la commande suivante dans un terminal : ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Vérifiez que l'empreinte est bien : ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` Si l'empreinte **EST** identique, vous pouvez continuer. -Si l'empreinte **N'EST PAS** identique, **NE POURSUIVEZ PAS.** Au lieu de cela, supprimez le fichier `fluffypony.asc` et retournez à la [rubrique 2.1](#21-obtenir-la-clef-de-signature). +Si l'empreinte **N'EST PAS** identique, **NE POURSUIVEZ PAS.** Au lieu de cela, supprimez le fichier `binaryfate.asc` et retournez à la [rubrique 2.1](#21-obtenir-la-clef-de-signature). ### 2.3. Importer la Clef de Signature Depuis un terminal, importez la clef de signature : ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` Si c'est la première fois que vous importez la clef, la sortie ressemblera à ceci : ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` Si vous avez déjà importé la clef précédemment, la sortie ressemblera à cela : ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -111,7 +110,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt ### 3.2. Vérifier le Fichier de Hachage -Le fichier de hachage est signé avec la clef `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, qui est une sous-clef de la clef `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (comme vous pouvez le voir dans la sortie ci-dessous). +Le fichier de hachage est signé avec la clef `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, comme vous pouvez le voir dans la sortie ci-dessous. Sur tous les systèmes d'exploitations, vérifiez la signature du fichier de hachage en tapant la commande suivante dans un terminal : @@ -122,13 +121,11 @@ gpg --verify hashes.txt Si le fichier est authentique, la sortie ressemblera à ceci : ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` Si votre sortie affiche **Good signature** comme dans l'exemple, alors vous pouvez continuer. @@ -146,21 +143,21 @@ Sur Windows et Mac, rendez-vous sur [getmonero.org](https://getmonero.org/fr/dow Sur Linux, vous pouvez télécharger les outils ligne de commande avec la commande suivante : ``` -wget -O monero-linux-x64-v0.12.2.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Vérifier les binaires sur Linux et Mac -Les étapes pour Linux et Mac sont les mêmes. Depuis un terminal, récupérez le hachage `SHA256` du binaire Monero téléchargé. A titre d'exemple, ce guide utilisera le binaire GUI `Linux, 64bit`. Remplacez `monero-gui-linux-x64-v0.12.0.0.tar.bz2` par le nom du binaire que vous aurez téléchargé dans la [rubrique 4.1](#41-télécharger-les-binaires-monero). +Les étapes pour Linux et Mac sont les mêmes. Depuis un terminal, récupérez le hachage `SHA256` du binaire Monero téléchargé. A titre d'exemple, ce guide utilisera le binaire GUI `Linux, 64bit`. Remplacez `monero-gui-linux-x64-v0.15.0.1.tar.bz2` par le nom du binaire que vous aurez téléchargé dans la [rubrique 4.1](#41-télécharger-les-binaires-monero). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` La sortie ressemblera à ceci, mais sera différente pour chaque binaire. Votre hachage `SHA256` deoit correspondre à celui indiqué dans le fichier `hashes.txt` pour votre binaire. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` Si votre hachage **EST** identique vous en avez terminé avec la vérification ! Vous pouvez extraire et installer les fichiers. @@ -172,7 +169,7 @@ Si votre hachage **N'EST PAS** identique, **NE POURSUIVEZ PAS.** Au lieu de cela Depuis un terminal, récupérez le hachage `SHA256` du binaire Monero téléchargé. A titre d'exemple, ce guide utilisera le binaire GUI `Windows, 64bit`. Remplacez `monero-gui-win-x64-v0.12.0.0.zip` par le nom du binaire que vous aurez téléchargé dans la [rubrique 4.1](#41-télécharger-les-binaires-monero). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` La sortie ressemblera à ceci, mais sera différente pour chaque binaire. Votre hachage `SHA256` deoit correspondre à celui indiqué dans le fichier `hashes.txt` pour votre binaire. diff --git a/_i18n/it/resources/user-guides/verification-allos-advanced.md b/_i18n/it/resources/user-guides/verification-allos-advanced.md index 29a0b82a..cc78f5f5 100644 --- a/_i18n/it/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/it/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc ### 2.1. Get Signing Key -On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory. +On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory. -On Linux, you can download Fluffypony's signing key by issuing the following command: +On Linux, you can download binaryFate's signing key by issuing the following command: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Verify Signing Key -On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal: +On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Verify the fingerprint matches: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` If the fingerprint **DOES** match, then you may proceed. -If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key). +If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key). ### 2.3. Import Signing Key From a terminal, import the signing key: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` If this is the first time you have imported the key, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` If you have imported the key previously, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity ### 3.1. Get Hash File -On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. +On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. On Linux, you can download the signed hashes file by issuing the following command: ``` -wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt +wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt ``` ### 3.2. Verify Hash File -The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below). +The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below. On all operating systems, verify the signature of the hash file by issuing the following command in a terminal: @@ -120,13 +119,11 @@ gpg --verify hashes.txt If the file is authentic, the output will look like this: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` If your output shows **Good signature**, as in the example, then you may proceed. @@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system, ### 4.1. Get Monero binary -On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** +On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** On Linux, you can download the command line tools by issuing the following command: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Binary Verification on Linux or Mac -The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` If your hash **DOES** match, then you are finished with the guide! You can extract the files and install. @@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary ### 4.3. Binary Verification on Windows -From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. @@ -182,4 +179,4 @@ CertUtil: -hashfile command completed successfully. If your hash **DOES** match, then you are finished with the guide! You can extract the files and install. -If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary you downloaded and go back to [section 4.1](#41-get-monero-binary). +If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary you downloaded and go back to [section 4.1](#41-get-monero-binary). \ No newline at end of file diff --git a/_i18n/nl/resources/user-guides/verification-allos-advanced.md b/_i18n/nl/resources/user-guides/verification-allos-advanced.md index 1749376d..73127170 100644 --- a/_i18n/nl/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/nl/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ In dit gedeelte leggen we uit hoe je de Monero-ondertekeningssleutel ophaalt, co ### 2.1. Ondertekeningssleutel ophalen -Op Windows of een Mac: ga naar [Fluffypony's GPG-sleutel](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), waarmee hij de Monero-binaries ondertekent, en sla de pagina op als `fluffypony.asc` in je homedirectory. +Op Windows of een Mac: ga naar [Fluffypony's GPG-sleutel](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), waarmee hij de Monero-binaries ondertekent, en sla de pagina op als `binaryfate.asc` in je homedirectory. -Op Linux kun je de ondertekeningssleutel van Fluffypony downloaden door de volgende opdracht op te geven: +Op Linux kun je de ondertekeningssleutel van binaryFate downloaden door de volgende opdracht op te geven: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Ondertekeningssleutel verifiëren -Op alle besturingssystemen kun je de vingerafdruk van `fluffypony.asc` controleren door de volgende opdracht te geven in een terminal: +Op alle besturingssystemen kun je de vingerafdruk van `binaryfate.asc` controleren door de volgende opdracht te geven in een terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Controleer of de vingerafdruk overeenkomt: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` Als de vingerafdruk **WEL** overeenkomt, kun je verder gaan. -**GA NIET VERDER** als de vingerafdruk **NIET** overeenkomt. Verwijder dan het bestand `fluffypony.asc` en ga terug naar [paragraaf 2.1](#21-get-signing-key). +**GA NIET VERDER** als de vingerafdruk **NIET** overeenkomt. Verwijder dan het bestand `binaryfate.asc` en ga terug naar [paragraaf 2.1](#21-get-signing-key). ### 2.3. Ondertekeningssleutel importeren Importeer de ondertekeningssleutel in een terminal: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` Als dit de eerste keer is dat je de sleutel hebt geïmporteerd, ziet de uitvoer er als volgt uit: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` Als je de sleutel eerder hebt geïmporteerd, ziet de uitvoer er als volgt uit: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -109,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt ### 3.2. Hashbestand verifiëren -Het hashbestand is ondertekend met de sleutel `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, een subsleutel van de sleutel `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (zoals weergegeven in de uitvoer hieronder). +Het hashbestand is ondertekend met de sleutel `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, zoals weergegeven in de uitvoer hieronder. Op alle besturingssystemen kun je de ondertekening van het hasbestand controleren door de volgende opdracht te geven in een terminal: @@ -120,13 +119,11 @@ gpg --verify hashes.txt Als het bestand authentiek is, ziet de uitvoer er als volgt uit: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` Als er **Good signature** in de uitvoer staat, zoals in het voorbeeld, kun je verder gaan. @@ -144,21 +141,21 @@ Op Windows of een Mac ga je naar [getmonero.org]({{ site.baseurl }}/downloads/) Op Linux kun je de opdrachtregelversie downloaden door de volgende opdracht op te geven: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Binary verifiëren op Linux of Mac -De stappen op zowel Linux als Mac zijn hetzelfde. In een terminal bereken je de `SHA256`-hash van je gedownloade Monero-binary. Als voorbeeld gebruiken we hier het binaire bestand voor 64-bits Linux. Vervang `monero-gui-linux-x64-v0.12.0.0.tar.bz2` door de naam van het binaire bestand dat je hebt gedownload in [paragraaf 4.1](#41-get-monero-binary). +De stappen op zowel Linux als Mac zijn hetzelfde. In een terminal bereken je de `SHA256`-hash van je gedownloade Monero-binary. Als voorbeeld gebruiken we hier het binaire bestand voor 64-bits Linux. Vervang `monero-gui-linux-x64-v0.15.0.1.tar.bz2` door de naam van het binaire bestand dat je hebt gedownload in [paragraaf 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` De uitvoer ziet er uit als volgt, maar met verschillende details per binair bestand. Je `SHA256`-hash moet overeenkomen met de hash in het bestand `hashes.txt` van je binaire bestand. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` Als de hash **WEL** overeenkomt, ben je klaar met deze handleiding! Dan kun je de bestanden uitpakken en installeren. @@ -170,7 +167,7 @@ Als de hash **WEL** overeenkomt, ben je klaar met deze handleiding! Dan kun je d In een terminal bereken je de `SHA256`-hash van je gedownloade Monero-binary. Als voorbeeld gebruiken we hier het binaire bestand voor de 64-bits Windows GUI. Vervang `monero-gui-win-x64-v0.12.0.0.zip` door de naam van het binaire bestand dat je hebt gedownload in [paragraaf 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` De uitvoer ziet er uit als volgt, maar met verschillende details per binair bestand. Je `SHA256`-hash moet overeenkomen met de hash in het bestand `hashes.txt` van je binaire bestand. diff --git a/_i18n/pl/resources/user-guides/verification-allos-advanced.md b/_i18n/pl/resources/user-guides/verification-allos-advanced.md index 29a0b82a..7d1f4d8d 100644 --- a/_i18n/pl/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/pl/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc ### 2.1. Get Signing Key -On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory. +On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory. -On Linux, you can download Fluffypony's signing key by issuing the following command: +On Linux, you can download binaryFate's signing key by issuing the following command: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Verify Signing Key -On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal: +On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Verify the fingerprint matches: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` If the fingerprint **DOES** match, then you may proceed. -If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key). +If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key). ### 2.3. Import Signing Key From a terminal, import the signing key: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` If this is the first time you have imported the key, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` If you have imported the key previously, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity ### 3.1. Get Hash File -On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. +On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. On Linux, you can download the signed hashes file by issuing the following command: ``` -wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt +wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt ``` ### 3.2. Verify Hash File -The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below). +The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below. On all operating systems, verify the signature of the hash file by issuing the following command in a terminal: @@ -120,13 +119,11 @@ gpg --verify hashes.txt If the file is authentic, the output will look like this: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` If your output shows **Good signature**, as in the example, then you may proceed. @@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system, ### 4.1. Get Monero binary -On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** +On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** On Linux, you can download the command line tools by issuing the following command: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Binary Verification on Linux or Mac -The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` If your hash **DOES** match, then you are finished with the guide! You can extract the files and install. @@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary ### 4.3. Binary Verification on Windows -From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. diff --git a/_i18n/ru/resources/user-guides/verification-allos-advanced.md b/_i18n/ru/resources/user-guides/verification-allos-advanced.md index c679027e..a9c414da 100644 --- a/_i18n/ru/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/ru/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ ### 2.1. Получение ключа подписи -Для Windows или Mac можно взять [GPG ключ Fluffypony](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), оторый он использует для подписи двоичных файлов Monero, и сохранить страницу как `fluffypony.asc` в вашей исходной, «домашней» директории. +Для Windows или Mac можно взять [GPG ключ binaryFate](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), оторый он использует для подписи двоичных файлов Monero, и сохранить страницу как `binaryfate.asc` в вашей исходной, «домашней» директории. Для Linux можно загрузить ключ подписи Fluffypony, используя следующую команду: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Верификация ключа подписи -В случае со всеми операционными системами следует проверить отпечаток в `fluffypony.asc` используя следующую команду в консоли: +В случае со всеми операционными системами следует проверить отпечаток в `binaryfate.asc` используя следующую команду в консоли: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Следует проверить совпадение отпечатков: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` Если отпечаток **СОВПАДЕТ**, можно продолжать. -В случае **НЕСОВПАДЕНИЯ** отпечатка, **ПРОДОЛЖАТЬ НЕ СЛЕДУЕТ**. Вместо этого необходимо удалить файл `fluffypony.asc` и вернуться к [пункту 2.1](#21-get-signing-key). +В случае **НЕСОВПАДЕНИЯ** отпечатка, **ПРОДОЛЖАТЬ НЕ СЛЕДУЕТ**. Вместо этого необходимо удалить файл `binaryfate.asc` и вернуться к [пункту 2.1](#21-get-signing-key). ### 2.3. Импорт ключа подписи Используя консоль, импортировать ключ подписи: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` Если ключ импортируется впервые, выход должен выглядеть так: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` Если же ключ импортировался до этого, то выход будет следующим: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -109,7 +108,7 @@ wget -O hashes.txt https://getmonero.org/downloads/hashes.txt ### 3.2. Верификация хеш-файла -Хеш-файл подписывается ключом `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, который является подключом ключа `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (что видно в выходе ниже). +Хеш-файл подписывается ключом `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, что видно в выходе ниже. В случае со всеми операционными системами следует проверить подпись хеш-файла, введя следующую команду в консоль: @@ -120,13 +119,11 @@ gpg --verify hashes.txt Если файл является аутентичным (подлинным), выход будет выглядеть так: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` Если в выходе видно, что подпись является **ПРАВИЛЬНОЙ**, как в примере, показанном выше, можно продолжать. @@ -144,7 +141,7 @@ Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 Для Linux можно загрузить инструменты командной строки, используя следующую команду: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Верификация двоичного файла под Linux и Mac @@ -152,13 +149,13 @@ wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/l Этапы проверки для Linux и Mac ничем не отличаются. Используя консоль, необходимо получить хеш `SHA256` загруженного двоичного файла Monero. Для примера в этом руководстве взят двоичный файл для `Linux 64-bit` GUI. Следует заменить `monero-gui-linux-x64-v0.12.0.0.tar.bz2` на имя двоичного файла, загруженного в соответствии с [пунктом 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` Выход должен выглядеть так, как показано, но при этом он будет отличаться в случае с каждым двоичным файлом. Хеш SHA256 должен соответствовать указанному в файле hashes.txt двоичного файла. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` При **СОВПАДЕНИИ** хеша можно завершить работу с настоящим руководством! Теперь файлы можно извлечь и установить. @@ -167,10 +164,10 @@ fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-lin ### 4.3. Верификация двоичного файла под Windows -Используя терминал, необходимо получить хеш `SHA256` загруженного двоичного файла Monero. Для примера в этом руководстве взят двоичный файл для `Windows, 64bit` GUI. Следует заменить `monero-gui-win-x64-v0.12.0.0.zip` на имя двоичного файла, загруженного в соответствии с [пунктом 4.1](#41-get-monero-binary). +Используя терминал, необходимо получить хеш `SHA256` загруженного двоичного файла Monero. Для примера в этом руководстве взят двоичный файл для `Windows, 64bit` GUI. Следует заменить `monero-gui-win-x64-v0.15.0.1.zip` на имя двоичного файла, загруженного в соответствии с [пунктом 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` Выход должен выглядеть так, как показано, но при этом он будет отличаться в случае с каждым двоичным файлом. Хеш `SHA256` должен соответствовать указанному в файле `hashes.txt` двоичного файла. diff --git a/_i18n/tr/resources/user-guides/verification-allos-advanced.md b/_i18n/tr/resources/user-guides/verification-allos-advanced.md index 523cdf51..7d1f4d8d 100644 --- a/_i18n/tr/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/tr/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc ### 2.1. Get Signing Key -On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory. +On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory. -On Linux, you can download Fluffypony's signing key by issuing the following command: +On Linux, you can download binaryFate's signing key by issuing the following command: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Verify Signing Key -On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal: +On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Verify the fingerprint matches: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` If the fingerprint **DOES** match, then you may proceed. -If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key). +If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key). ### 2.3. Import Signing Key From a terminal, import the signing key: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` If this is the first time you have imported the key, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` If you have imported the key previously, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -109,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt ### 3.2. Verify Hash File -The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below). +The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below. On all operating systems, verify the signature of the hash file by issuing the following command in a terminal: @@ -120,13 +119,11 @@ gpg --verify hashes.txt If the file is authentic, the output will look like this: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` If your output shows **Good signature**, as in the example, then you may proceed. @@ -144,21 +141,21 @@ On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and On Linux, you can download the command line tools by issuing the following command: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Binary Verification on Linux or Mac -The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` If your hash **DOES** match, then you are finished with the guide! You can extract the files and install. @@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary ### 4.3. Binary Verification on Windows -From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. diff --git a/_i18n/zh-cn/resources/user-guides/verification-allos-advanced.md b/_i18n/zh-cn/resources/user-guides/verification-allos-advanced.md index 29a0b82a..7d1f4d8d 100644 --- a/_i18n/zh-cn/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/zh-cn/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc ### 2.1. Get Signing Key -On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory. +On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory. -On Linux, you can download Fluffypony's signing key by issuing the following command: +On Linux, you can download binaryFate's signing key by issuing the following command: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Verify Signing Key -On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal: +On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Verify the fingerprint matches: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` If the fingerprint **DOES** match, then you may proceed. -If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key). +If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key). ### 2.3. Import Signing Key From a terminal, import the signing key: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` If this is the first time you have imported the key, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` If you have imported the key previously, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity ### 3.1. Get Hash File -On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. +On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. On Linux, you can download the signed hashes file by issuing the following command: ``` -wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt +wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt ``` ### 3.2. Verify Hash File -The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below). +The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below. On all operating systems, verify the signature of the hash file by issuing the following command in a terminal: @@ -120,13 +119,11 @@ gpg --verify hashes.txt If the file is authentic, the output will look like this: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` If your output shows **Good signature**, as in the example, then you may proceed. @@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system, ### 4.1. Get Monero binary -On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** +On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** On Linux, you can download the command line tools by issuing the following command: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Binary Verification on Linux or Mac -The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` If your hash **DOES** match, then you are finished with the guide! You can extract the files and install. @@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary ### 4.3. Binary Verification on Windows -From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. diff --git a/_i18n/zh-tw/resources/user-guides/verification-allos-advanced.md b/_i18n/zh-tw/resources/user-guides/verification-allos-advanced.md index 396ab0a4..22ad5cb3 100644 --- a/_i18n/zh-tw/resources/user-guides/verification-allos-advanced.md +++ b/_i18n/zh-tw/resources/user-guides/verification-allos-advanced.md @@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc ### 2.1. Get Signing Key -On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory. +On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory. -On Linux, you can download Fluffypony's signing key by issuing the following command: +On Linux, you can download binaryFate's signing key by issuing the following command: ``` -wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc +wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc ``` ### 2.2. Verify Signing Key -On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal: +On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal: ``` -gpg --keyid-format long --with-fingerprint fluffypony.asc +gpg --keyid-format long --with-fingerprint binaryfate.asc ``` Verify the fingerprint matches: ``` -pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni - Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 -sub 2048R/55432DF31CCD4FCD 2013-04-08 +pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA] + Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 +uid binaryFate ``` If the fingerprint **DOES** match, then you may proceed. -If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key). +If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key). ### 2.3. Import Signing Key From a terminal, import the signing key: ``` -gpg --import fluffypony.asc +gpg --import binaryfate.asc ``` If this is the first time you have imported the key, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys -gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni " importe -d +gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys +gpg: key F0AF4D462A0BDF92: public key "binaryFate " imported gpg: Total number processed: 1 gpg: imported: 1 -gpg: no ultimately trusted keys found +gpg: marginals needed: 3 completes needed: 1 trust model: pgp ``` If you have imported the key previously, the output will look like this: ``` -gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni " not changed +gpg: key F0AF4D462A0BDF92: "binaryFate " not changed gpg: Total number processed: 1 gpg: unchanged: 1 ``` @@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity ### 3.1. Get Hash File -On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. +On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory. On Linux, you can download the signed hashes file by issuing the following command: ``` -wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt +wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt ``` ### 3.2. Verify Hash File -The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below). +The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below. On all operating systems, verify the signature of the hash file by issuing the following command in a terminal: @@ -120,13 +119,11 @@ gpg --verify hashes.txt If the file is authentic, the output will look like this: ``` -gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT -gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD -gpg: Good signature from "Riccardo Spagni " [unknown] +gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92 +gpg: Good signature from "binaryFate " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. -Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9 - Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD +Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92 ``` If your output shows **Good signature**, as in the example, then you may proceed. @@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system, ### 4.1. Get Monero binary -On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** +On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.** On Linux, you can download the command line tools by issuing the following command: ``` -wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64 +wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64 ``` ### 4.2. Binary Verification on Linux or Mac -The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file. ``` -fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2 +8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ``` If your hash **DOES** match, then you are finished with the guide! You can extract the files and install. @@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary ### 4.3. Binary Verification on Windows -From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). +From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). ``` -certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256 +certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256 ``` The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.