Sync 'verification-allos-advanced.md' with english version for all languages

Except pt-br, which is being PRd separately (#935)
This commit is contained in:
erciccione 2020-04-17 11:46:11 +02:00
parent 07717bed77
commit 4c169743ee
No known key found for this signature in database
GPG key ID: 762AF8C608E56CDF
11 changed files with 272 additions and 304 deletions

View file

@ -37,58 +37,57 @@
### 2.1. إحصل علي مفتاح التوقيع
علي ويندوز أو ماك إذهب إلي [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc) لتحميل المُفتاح المُستخدم في توقيع الملفات وقم بحفظه بإسم `fluffypony.asc` في مجلدك الرئيسي.
علي ويندوز أو ماك إذهب إلي [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc) لتحميل المُفتاح المُستخدم في توقيع الملفات وقم بحفظه بإسم `binaryfate.asc` في مجلدك الرئيسي.
في ليُنكس يمكنك تحميل ملف مفتاح التوقيع من خلال الأمر التالي :
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. تأكد من مفتاح التوقيع
في جميع أنظمة التشغيل ، تحقق من بصمة `fluffypony.asc` بإصدار الأمر التالي في سطر الأوامر :
في جميع أنظمة التشغيل ، تحقق من بصمة `binaryfate.asc` بإصدار الأمر التالي في سطر الأوامر :
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
تحقق من تطابق البصمه بالتالي :
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
إذا كانت البصمه **صحيحه** يمكنك المُتابعه.
إذا كانت البصمه ** غير متطابقه ** **لا تُكمل** بل قم بحذف ملف `fluffypony.asc` وإذهب إلي [فصل 2.1](#21-get-signing-key).
إذا كانت البصمه ** غير متطابقه ** **لا تُكمل** بل قم بحذف ملف `binaryfate.asc` وإذهب إلي [فصل 2.1](#21-get-signing-key).
### 2.3. إستيراد مفتاح التوقيع
من سطر الأوامر ، قم باستيراد مفتاح التوقيع:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
إذا كانت هذه هي المرة الأولى التي تستورد فيها المفتاح ، فسيبدو الناتج كما يلي:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
إذا قمت باستيراد المفتاح مسبقًا ، فسيبدو الناتج كما يلي:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -109,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
### 3.2. تأكد من ملف الهاش
ملف الهاش موقع بمفتاح `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, الذي هو مفتاح فرعي من المفتاح `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (كما هو موضح في الناتج أدناه).
ملف الهاش موقع بمفتاح `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, كما هو موضح في الناتج أدناه.
في جميع أنظمة التشغيل ، تحقق من توقيع ملف التجزئة عن طريق إصدار الأمر التالي في سطر الأوامر:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
إذا كان الملف صحيح ، سيبدو الناتج كما يلي:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
إذا كان الناتج يُظهر ** Good signature ** كما هو موضح في المثال فيمكنك المتابعة.
@ -144,21 +141,21 @@ Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
في Linux ، يمكنك تنزيل واجهه سطر الأوامر عن طريق إصدار الأمر التالي:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. تأكد من الملفات علي ليُنكس اوماك
هذه الخطوات لنظامي تشغيل لينُكس وماك. من سطر الأوامر إحصل علي هاش `SHA256` لملف التثبيت. كمثال سيستخدم هذا الدليل واجهه المستخدم الرسوميه علي ليُنكس , إستبدل `monero-gui-linux-x64-v0.12.0.0.tar.bz2` بإسم ملف التثبيت الذي قمت بتنزيله في [الفصل 4.1](#41-get-monero-binary).
هذه الخطوات لنظامي تشغيل لينُكس وماك. من سطر الأوامر إحصل علي هاش `SHA256` لملف التثبيت. كمثال سيستخدم هذا الدليل واجهه المستخدم الرسوميه علي ليُنكس , إستبدل `monero-gui-linux-x64-v0.15.0.1.tar.bz2` بإسم ملف التثبيت الذي قمت بتنزيله في [الفصل 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-gui-linux-x64-v0.15.0.1.tar.bz2
```
سيبدو الناتج كهذا ، ولكن سيكون مختلفًا لكل ملف. يجب أن يتطابق هاش `SHA256` الخاصة بك مع الهاش في القائمة المدرجة في ملف` hashes.txt` لملف التثبيت.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.15.0.1.tar.bz2
```
إذا كان الهاش **مُتطابق** يمكنك الأن فك الضفط والتثبيت.
@ -167,7 +164,7 @@ fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-lin
### 4.3. تأكد من الملفات علي ويندوز
من سطر الأوامر احصل على هاش `SHA256` من ملف التثبيت الذي تم تنزيله. على سبيل المثال ، سيستخدم هذا الدليل ثنائي واجهة المستخدم الرسومية لنظام ويندوز ، 64 بت. استبدل `monero-gui-win-x64-v0.12.0.0.zip` باسم الملف الذي قمت بتنزيله في [القسم 4.1](#41-get-monero-binary).
من سطر الأوامر احصل على هاش `SHA256` من ملف التثبيت الذي تم تنزيله. على سبيل المثال ، سيستخدم هذا الدليل ثنائي واجهة المستخدم الرسومية لنظام ويندوز ، 64 بت. استبدل `monero-gui-win-x64-v0.15.0.1.zip` باسم الملف الذي قمت بتنزيله في [القسم 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256

View file

@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc
### 2.1. Get Signing Key
On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory.
On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory.
On Linux, you can download Fluffypony's signing key by issuing the following command:
On Linux, you can download binaryFate's signing key by issuing the following command:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Verify Signing Key
On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal:
On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Verify the fingerprint matches:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
If the fingerprint **DOES** match, then you may proceed.
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key).
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key).
### 2.3. Import Signing Key
From a terminal, import the signing key:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
If this is the first time you have imported the key, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
If you have imported the key previously, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity
### 3.1. Get Hash File
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Linux, you can download the signed hashes file by issuing the following command:
```
wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt
```
### 3.2. Verify Hash File
The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below).
The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below.
On all operating systems, verify the signature of the hash file by issuing the following command in a terminal:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
If the file is authentic, the output will look like this:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
If your output shows **Good signature**, as in the example, then you may proceed.
@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system,
### 4.1. Get Monero binary
On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Linux, you can download the command line tools by issuing the following command:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Binary Verification on Linux or Mac
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
If your hash **DOES** match, then you are finished with the guide! You can extract the files and install.
@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary
### 4.3. Binary Verification on Windows
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.

View file

@ -37,57 +37,57 @@ Esta sección cubre la obtención de la clave de firma Monero, asegurar que sea
### 2.1. Obtener Clave de Firma
En Windows o Mac, ve a la [clave GPG de Fluffypony](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), que utiliza para firmar los binarios Monero, y guarda la página como `fluffypony.asc` en tu directorio de inicio.
En Windows o Mac, ve a la [clave GPG de binaryFate](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), que utiliza para firmar los binarios Monero, y guarda la página como `binaryFate.asc` en tu directorio de inicio.
En Linux, puedes descargar la clave de firma de Fluffypony utilizando el siguiente comando:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Verificar Clave de Firma
En todos los sistemas operativos, revisa la huella de `fluffypony.asc` utilizando el siguiente comando en una terminal:
En todos los sistemas operativos, revisa la huella de `binaryfate.asc` utilizando el siguiente comando en una terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Verifica que la huella coincida:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
Si la firma **SÍ** coincide, entonces puedes continuar.
Si la firma **NO** coincide, **NO CONTINÚES.** En su lugar borra el archivo `fluffypony.asc` y regresa a la [sección 2.1](#21-obtener-clave-de-firma).
Si la firma **NO** coincide, **NO CONTINÚES.** En su lugar borra el archivo `binaryfate.asc` y regresa a la [sección 2.1](#21-obtener-clave-de-firma).
### 2.3. Importar Clave de Firma
Desde una terminal, importa la clave de firma:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
Si es la primera vez que importas la clave, la salida se verá como esto:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" imported
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
Si ya has importado la clave previamente, la salida se verá como esto:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -108,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
### 3.2. Verificar Archivo Hash
El archivo hash está firmado con la clave `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, Que es una sub clave de `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (como se observa en la salida abajo).
El archivo hash está firmado con la clave `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92` (como se observa en la salida abajo).
En todos los sistemas operativos, verifica la firma del archivo hash utilizando el siguiente comando en una terminal:
@ -119,13 +119,11 @@ gpg --verify hashes.txt
Si el archivo es auténtico, la salida se verá como esto:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
Si la salida muestra **Good signature**, como en el ejemplo, puedes continuar.
@ -143,21 +141,21 @@ En Windows o Mac, ve a [getmonero.org]({{ site.baseurl }}/downloads/) y descarga
En Linux, puedes descargar las herramientas de consola de comandos utilizando el siguiente comando:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Verificación de Binarios en Linux o Mac
Los pasos para Linux o Mac son los mismos. Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Linux, 64bit`. Reemplaza `monero-gui-linux-x64-v0.12.0.0.tar.bz2` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero).
Los pasos para Linux o Mac son los mismos. Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Linux, 64bit`. Reemplaza `monero-gui-linux-x64-v0.15.0.1.tar.bz2` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
La salida se verá como esto, pero será diferente para cada archivo binario. Tu hash `SHA256` debe coincidir con el hash listado en el archivo `hashes.txt` para tu archivo binario.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
Si tu hash **SÍ** coincide, ¡entonces has terminado con la guía! Puedes extraer los archivos e instalarlos.
@ -166,10 +164,10 @@ Si tu hash **NO** coincide, **NO CONTINÚES.** En su lugar, elimina el binario d
### 4.3. Verificación de Binarios en Windows
Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Windows, 64bit`. Reemplaza `monero-gui-win-x64-v0.12.0.0.zip` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero).
Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Windows, 64bit`. Reemplaza `monero-gui-win-x64-v0.15.0.1.zip` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
La salida se verá como esto, pero será diferente para cada archivo binario. Tu hash `SHA256` debe coincidir con el hash listado en el archivo `hashes.txt` para tu archivo binario.

View file

@ -39,58 +39,57 @@ Cette rubrique couvre le téléchargement de la clef de signature Monero, la vé
### 2.1. Obtenir la Clef de Signature
Sur Windows et Mac, rendez-vous sur [la clef GPG de Fluffypony](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), qu'il utilise pour signer les binaires Monero et sauvegardez la page sous `fluffypony.asc` dans votre répertoire utilisateur.
Sur Windows et Mac, rendez-vous sur [la clef GPG de binaryFate](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), qu'il utilise pour signer les binaires Monero et sauvegardez la page sous `binaryfate.asc` dans votre répertoire utilisateur.
Sur Linux, vous pouvez télécharger la clef de signature de Fluffypony en tapant la commande suivante :
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Vérifier la Clef de Signature
Sur l'ensemble des systèmes d'exploitation, vérifiez l'empreinte de `fluffypony.asc` en tapant la commande suivante dans un terminal :
Sur l'ensemble des systèmes d'exploitation, vérifiez l'empreinte de `binaryfate.asc` en tapant la commande suivante dans un terminal :
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Vérifiez que l'empreinte est bien :
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
Si l'empreinte **EST** identique, vous pouvez continuer.
Si l'empreinte **N'EST PAS** identique, **NE POURSUIVEZ PAS.** Au lieu de cela, supprimez le fichier `fluffypony.asc` et retournez à la [rubrique 2.1](#21-obtenir-la-clef-de-signature).
Si l'empreinte **N'EST PAS** identique, **NE POURSUIVEZ PAS.** Au lieu de cela, supprimez le fichier `binaryfate.asc` et retournez à la [rubrique 2.1](#21-obtenir-la-clef-de-signature).
### 2.3. Importer la Clef de Signature
Depuis un terminal, importez la clef de signature :
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
Si c'est la première fois que vous importez la clef, la sortie ressemblera à ceci :
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
Si vous avez déjà importé la clef précédemment, la sortie ressemblera à cela :
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -111,7 +110,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
### 3.2. Vérifier le Fichier de Hachage
Le fichier de hachage est signé avec la clef `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, qui est une sous-clef de la clef `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (comme vous pouvez le voir dans la sortie ci-dessous).
Le fichier de hachage est signé avec la clef `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, comme vous pouvez le voir dans la sortie ci-dessous.
Sur tous les systèmes d'exploitations, vérifiez la signature du fichier de hachage en tapant la commande suivante dans un terminal :
@ -122,13 +121,11 @@ gpg --verify hashes.txt
Si le fichier est authentique, la sortie ressemblera à ceci :
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
Si votre sortie affiche **Good signature** comme dans l'exemple, alors vous pouvez continuer.
@ -146,21 +143,21 @@ Sur Windows et Mac, rendez-vous sur [getmonero.org](https://getmonero.org/fr/dow
Sur Linux, vous pouvez télécharger les outils ligne de commande avec la commande suivante :
```
wget -O monero-linux-x64-v0.12.2.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Vérifier les binaires sur Linux et Mac
Les étapes pour Linux et Mac sont les mêmes. Depuis un terminal, récupérez le hachage `SHA256` du binaire Monero téléchargé. A titre d'exemple, ce guide utilisera le binaire GUI `Linux, 64bit`. Remplacez `monero-gui-linux-x64-v0.12.0.0.tar.bz2` par le nom du binaire que vous aurez téléchargé dans la [rubrique 4.1](#41-télécharger-les-binaires-monero).
Les étapes pour Linux et Mac sont les mêmes. Depuis un terminal, récupérez le hachage `SHA256` du binaire Monero téléchargé. A titre d'exemple, ce guide utilisera le binaire GUI `Linux, 64bit`. Remplacez `monero-gui-linux-x64-v0.15.0.1.tar.bz2` par le nom du binaire que vous aurez téléchargé dans la [rubrique 4.1](#41-télécharger-les-binaires-monero).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
La sortie ressemblera à ceci, mais sera différente pour chaque binaire. Votre hachage `SHA256` deoit correspondre à celui indiqué dans le fichier `hashes.txt` pour votre binaire.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
Si votre hachage **EST** identique vous en avez terminé avec la vérification ! Vous pouvez extraire et installer les fichiers.
@ -172,7 +169,7 @@ Si votre hachage **N'EST PAS** identique, **NE POURSUIVEZ PAS.** Au lieu de cela
Depuis un terminal, récupérez le hachage `SHA256` du binaire Monero téléchargé. A titre d'exemple, ce guide utilisera le binaire GUI `Windows, 64bit`. Remplacez `monero-gui-win-x64-v0.12.0.0.zip` par le nom du binaire que vous aurez téléchargé dans la [rubrique 4.1](#41-télécharger-les-binaires-monero).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
La sortie ressemblera à ceci, mais sera différente pour chaque binaire. Votre hachage `SHA256` deoit correspondre à celui indiqué dans le fichier `hashes.txt` pour votre binaire.

View file

@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc
### 2.1. Get Signing Key
On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory.
On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory.
On Linux, you can download Fluffypony's signing key by issuing the following command:
On Linux, you can download binaryFate's signing key by issuing the following command:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Verify Signing Key
On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal:
On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Verify the fingerprint matches:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
If the fingerprint **DOES** match, then you may proceed.
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key).
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key).
### 2.3. Import Signing Key
From a terminal, import the signing key:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
If this is the first time you have imported the key, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
If you have imported the key previously, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity
### 3.1. Get Hash File
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Linux, you can download the signed hashes file by issuing the following command:
```
wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt
```
### 3.2. Verify Hash File
The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below).
The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below.
On all operating systems, verify the signature of the hash file by issuing the following command in a terminal:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
If the file is authentic, the output will look like this:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
If your output shows **Good signature**, as in the example, then you may proceed.
@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system,
### 4.1. Get Monero binary
On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Linux, you can download the command line tools by issuing the following command:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Binary Verification on Linux or Mac
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
If your hash **DOES** match, then you are finished with the guide! You can extract the files and install.
@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary
### 4.3. Binary Verification on Windows
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.
@ -182,4 +179,4 @@ CertUtil: -hashfile command completed successfully.
If your hash **DOES** match, then you are finished with the guide! You can extract the files and install.
If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary you downloaded and go back to [section 4.1](#41-get-monero-binary).
If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary you downloaded and go back to [section 4.1](#41-get-monero-binary).

View file

@ -37,58 +37,57 @@ In dit gedeelte leggen we uit hoe je de Monero-ondertekeningssleutel ophaalt, co
### 2.1. Ondertekeningssleutel ophalen
Op Windows of een Mac: ga naar [Fluffypony's GPG-sleutel](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), waarmee hij de Monero-binaries ondertekent, en sla de pagina op als `fluffypony.asc` in je homedirectory.
Op Windows of een Mac: ga naar [Fluffypony's GPG-sleutel](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), waarmee hij de Monero-binaries ondertekent, en sla de pagina op als `binaryfate.asc` in je homedirectory.
Op Linux kun je de ondertekeningssleutel van Fluffypony downloaden door de volgende opdracht op te geven:
Op Linux kun je de ondertekeningssleutel van binaryFate downloaden door de volgende opdracht op te geven:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Ondertekeningssleutel verifiëren
Op alle besturingssystemen kun je de vingerafdruk van `fluffypony.asc` controleren door de volgende opdracht te geven in een terminal:
Op alle besturingssystemen kun je de vingerafdruk van `binaryfate.asc` controleren door de volgende opdracht te geven in een terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Controleer of de vingerafdruk overeenkomt:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
Als de vingerafdruk **WEL** overeenkomt, kun je verder gaan.
**GA NIET VERDER** als de vingerafdruk **NIET** overeenkomt. Verwijder dan het bestand `fluffypony.asc` en ga terug naar [paragraaf 2.1](#21-get-signing-key).
**GA NIET VERDER** als de vingerafdruk **NIET** overeenkomt. Verwijder dan het bestand `binaryfate.asc` en ga terug naar [paragraaf 2.1](#21-get-signing-key).
### 2.3. Ondertekeningssleutel importeren
Importeer de ondertekeningssleutel in een terminal:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
Als dit de eerste keer is dat je de sleutel hebt geïmporteerd, ziet de uitvoer er als volgt uit:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
Als je de sleutel eerder hebt geïmporteerd, ziet de uitvoer er als volgt uit:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -109,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
### 3.2. Hashbestand verifiëren
Het hashbestand is ondertekend met de sleutel `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, een subsleutel van de sleutel `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (zoals weergegeven in de uitvoer hieronder).
Het hashbestand is ondertekend met de sleutel `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, zoals weergegeven in de uitvoer hieronder.
Op alle besturingssystemen kun je de ondertekening van het hasbestand controleren door de volgende opdracht te geven in een terminal:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
Als het bestand authentiek is, ziet de uitvoer er als volgt uit:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
Als er **Good signature** in de uitvoer staat, zoals in het voorbeeld, kun je verder gaan.
@ -144,21 +141,21 @@ Op Windows of een Mac ga je naar [getmonero.org]({{ site.baseurl }}/downloads/)
Op Linux kun je de opdrachtregelversie downloaden door de volgende opdracht op te geven:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Binary verifiëren op Linux of Mac
De stappen op zowel Linux als Mac zijn hetzelfde. In een terminal bereken je de `SHA256`-hash van je gedownloade Monero-binary. Als voorbeeld gebruiken we hier het binaire bestand voor 64-bits Linux. Vervang `monero-gui-linux-x64-v0.12.0.0.tar.bz2` door de naam van het binaire bestand dat je hebt gedownload in [paragraaf 4.1](#41-get-monero-binary).
De stappen op zowel Linux als Mac zijn hetzelfde. In een terminal bereken je de `SHA256`-hash van je gedownloade Monero-binary. Als voorbeeld gebruiken we hier het binaire bestand voor 64-bits Linux. Vervang `monero-gui-linux-x64-v0.15.0.1.tar.bz2` door de naam van het binaire bestand dat je hebt gedownload in [paragraaf 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
De uitvoer ziet er uit als volgt, maar met verschillende details per binair bestand. Je `SHA256`-hash moet overeenkomen met de hash in het bestand `hashes.txt` van je binaire bestand.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
Als de hash **WEL** overeenkomt, ben je klaar met deze handleiding! Dan kun je de bestanden uitpakken en installeren.
@ -170,7 +167,7 @@ Als de hash **WEL** overeenkomt, ben je klaar met deze handleiding! Dan kun je d
In een terminal bereken je de `SHA256`-hash van je gedownloade Monero-binary. Als voorbeeld gebruiken we hier het binaire bestand voor de 64-bits Windows GUI. Vervang `monero-gui-win-x64-v0.12.0.0.zip` door de naam van het binaire bestand dat je hebt gedownload in [paragraaf 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
De uitvoer ziet er uit als volgt, maar met verschillende details per binair bestand. Je `SHA256`-hash moet overeenkomen met de hash in het bestand `hashes.txt` van je binaire bestand.

View file

@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc
### 2.1. Get Signing Key
On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory.
On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory.
On Linux, you can download Fluffypony's signing key by issuing the following command:
On Linux, you can download binaryFate's signing key by issuing the following command:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Verify Signing Key
On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal:
On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Verify the fingerprint matches:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
If the fingerprint **DOES** match, then you may proceed.
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key).
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key).
### 2.3. Import Signing Key
From a terminal, import the signing key:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
If this is the first time you have imported the key, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
If you have imported the key previously, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity
### 3.1. Get Hash File
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Linux, you can download the signed hashes file by issuing the following command:
```
wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt
```
### 3.2. Verify Hash File
The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below).
The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below.
On all operating systems, verify the signature of the hash file by issuing the following command in a terminal:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
If the file is authentic, the output will look like this:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
If your output shows **Good signature**, as in the example, then you may proceed.
@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system,
### 4.1. Get Monero binary
On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Linux, you can download the command line tools by issuing the following command:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Binary Verification on Linux or Mac
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
If your hash **DOES** match, then you are finished with the guide! You can extract the files and install.
@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary
### 4.3. Binary Verification on Windows
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.

View file

@ -37,58 +37,57 @@
### 2.1. Получение ключа подписи
Для Windows или Mac можно взять [GPG ключ Fluffypony](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), оторый он использует для подписи двоичных файлов Monero, и сохранить страницу как `fluffypony.asc` в вашей исходной, «домашней» директории.
Для Windows или Mac можно взять [GPG ключ binaryFate](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), оторый он использует для подписи двоичных файлов Monero, и сохранить страницу как `binaryfate.asc` в вашей исходной, «домашней» директории.
Для Linux можно загрузить ключ подписи Fluffypony, используя следующую команду:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Верификация ключа подписи
В случае со всеми операционными системами следует проверить отпечаток в `fluffypony.asc` используя следующую команду в консоли:
В случае со всеми операционными системами следует проверить отпечаток в `binaryfate.asc` используя следующую команду в консоли:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Следует проверить совпадение отпечатков:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
Если отпечаток **СОВПАДЕТ**, можно продолжать.
В случае **НЕСОВПАДЕНИЯ** отпечатка, **ПРОДОЛЖАТЬ НЕ СЛЕДУЕТ**. Вместо этого необходимо удалить файл `fluffypony.asc` и вернуться к [пункту 2.1](#21-get-signing-key).
В случае **НЕСОВПАДЕНИЯ** отпечатка, **ПРОДОЛЖАТЬ НЕ СЛЕДУЕТ**. Вместо этого необходимо удалить файл `binaryfate.asc` и вернуться к [пункту 2.1](#21-get-signing-key).
### 2.3. Импорт ключа подписи
Используя консоль, импортировать ключ подписи:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
Если ключ импортируется впервые, выход должен выглядеть так:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
Если же ключ импортировался до этого, то выход будет следующим:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -109,7 +108,7 @@ wget -O hashes.txt https://getmonero.org/downloads/hashes.txt
### 3.2. Верификация хеш-файла
Хеш-файл подписывается ключом `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, который является подключом ключа `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (что видно в выходе ниже).
Хеш-файл подписывается ключом `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, что видно в выходе ниже.
В случае со всеми операционными системами следует проверить подпись хеш-файла, введя следующую команду в консоль:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
Если файл является аутентичным (подлинным), выход будет выглядеть так:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
Если в выходе видно, что подпись является **ПРАВИЛЬНОЙ**, как в примере, показанном выше, можно продолжать.
@ -144,7 +141,7 @@ Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Для Linux можно загрузить инструменты командной строки, используя следующую команду:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Верификация двоичного файла под Linux и Mac
@ -152,13 +149,13 @@ wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/l
Этапы проверки для Linux и Mac ничем не отличаются. Используя консоль, необходимо получить хеш `SHA256` загруженного двоичного файла Monero. Для примера в этом руководстве взят двоичный файл для `Linux 64-bit` GUI. Следует заменить `monero-gui-linux-x64-v0.12.0.0.tar.bz2` на имя двоичного файла, загруженного в соответствии с [пунктом 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
Выход должен выглядеть так, как показано, но при этом он будет отличаться в случае с каждым двоичным файлом. Хеш SHA256 должен соответствовать указанному в файле hashes.txt двоичного файла.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
При **СОВПАДЕНИИ** хеша можно завершить работу с настоящим руководством! Теперь файлы можно извлечь и установить.
@ -167,10 +164,10 @@ fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-lin
### 4.3. Верификация двоичного файла под Windows
Используя терминал, необходимо получить хеш `SHA256` загруженного двоичного файла Monero. Для примера в этом руководстве взят двоичный файл для `Windows, 64bit` GUI. Следует заменить `monero-gui-win-x64-v0.12.0.0.zip` на имя двоичного файла, загруженного в соответствии с [пунктом 4.1](#41-get-monero-binary).
Используя терминал, необходимо получить хеш `SHA256` загруженного двоичного файла Monero. Для примера в этом руководстве взят двоичный файл для `Windows, 64bit` GUI. Следует заменить `monero-gui-win-x64-v0.15.0.1.zip` на имя двоичного файла, загруженного в соответствии с [пунктом 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
Выход должен выглядеть так, как показано, но при этом он будет отличаться в случае с каждым двоичным файлом. Хеш `SHA256` должен соответствовать указанному в файле `hashes.txt` двоичного файла.

View file

@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc
### 2.1. Get Signing Key
On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory.
On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory.
On Linux, you can download Fluffypony's signing key by issuing the following command:
On Linux, you can download binaryFate's signing key by issuing the following command:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Verify Signing Key
On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal:
On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Verify the fingerprint matches:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
If the fingerprint **DOES** match, then you may proceed.
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key).
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key).
### 2.3. Import Signing Key
From a terminal, import the signing key:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
If this is the first time you have imported the key, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
If you have imported the key previously, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -109,7 +108,7 @@ wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt
### 3.2. Verify Hash File
The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below).
The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below.
On all operating systems, verify the signature of the hash file by issuing the following command in a terminal:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
If the file is authentic, the output will look like this:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
If your output shows **Good signature**, as in the example, then you may proceed.
@ -144,21 +141,21 @@ On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and
On Linux, you can download the command line tools by issuing the following command:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Binary Verification on Linux or Mac
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
If your hash **DOES** match, then you are finished with the guide! You can extract the files and install.
@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary
### 4.3. Binary Verification on Windows
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.

View file

@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc
### 2.1. Get Signing Key
On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory.
On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory.
On Linux, you can download Fluffypony's signing key by issuing the following command:
On Linux, you can download binaryFate's signing key by issuing the following command:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Verify Signing Key
On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal:
On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Verify the fingerprint matches:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
If the fingerprint **DOES** match, then you may proceed.
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key).
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key).
### 2.3. Import Signing Key
From a terminal, import the signing key:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
If this is the first time you have imported the key, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
If you have imported the key previously, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity
### 3.1. Get Hash File
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Linux, you can download the signed hashes file by issuing the following command:
```
wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt
```
### 3.2. Verify Hash File
The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below).
The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below.
On all operating systems, verify the signature of the hash file by issuing the following command in a terminal:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
If the file is authentic, the output will look like this:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
If your output shows **Good signature**, as in the example, then you may proceed.
@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system,
### 4.1. Get Monero binary
On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Linux, you can download the command line tools by issuing the following command:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Binary Verification on Linux or Mac
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
If your hash **DOES** match, then you are finished with the guide! You can extract the files and install.
@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary
### 4.3. Binary Verification on Windows
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.

View file

@ -37,58 +37,57 @@ This section will cover getting the Monero signing key, making sure it is correc
### 2.1. Get Signing Key
On Windows or Mac, go to [Fluffypony's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc), which he uses to sign the Monero binaries, and save the page as `fluffypony.asc` to your home directory.
On Windows or Mac, go to [binaryFate's GPG key](https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc), which he uses to sign the Monero binaries, and save the page as `binaryfate.asc` to your home directory.
On Linux, you can download Fluffypony's signing key by issuing the following command:
On Linux, you can download binaryFate's signing key by issuing the following command:
```
wget -O fluffypony.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/fluffypony.asc
wget -O binaryfate.asc https://raw.githubusercontent.com/monero-project/monero/master/utils/gpg_keys/binaryfate.asc
```
### 2.2. Verify Signing Key
On all operating systems, check the fingerprint of `fluffypony.asc` by issuing the following command in a terminal:
On all operating systems, check the fingerprint of `binaryfate.asc` by issuing the following command in a terminal:
```
gpg --keyid-format long --with-fingerprint fluffypony.asc
gpg --keyid-format long --with-fingerprint binaryfate.asc
```
Verify the fingerprint matches:
```
pub 2048R/7455C5E3C0CDCEB9 2013-04-08 Riccardo Spagni <ric@spagni.net>
Key fingerprint = BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
sub 2048R/55432DF31CCD4FCD 2013-04-08
pub rsa4096/F0AF4D462A0BDF92 2019-12-12 [SCEA]
Key fingerprint = 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
uid binaryFate <binaryfate@getmonero.org>
```
If the fingerprint **DOES** match, then you may proceed.
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `fluffypony.asc` and go back to [section 2.1](#21-get-signing-key).
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key).
### 2.3. Import Signing Key
From a terminal, import the signing key:
```
gpg --import fluffypony.asc
gpg --import binaryfate.asc
```
If this is the first time you have imported the key, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: 2 signatures not checked due to missing keys
gpg: key 0x7455C5E3C0CDCEB9: public key "Riccardo Spagni <ric@spagni.net>" importe
d
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <binaryfate@getmonero.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
If you have imported the key previously, the output will look like this:
```
gpg: key 0x7455C5E3C0CDCEB9: "Riccardo Spagni <ric@spagni.net>" not changed
gpg: key F0AF4D462A0BDF92: "binaryFate <binaryfate@getmonero.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
@ -99,17 +98,17 @@ This section will cover downloading the hash file and verifying its authenticity
### 3.1. Get Hash File
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Windows or Mac, go to the [hashes file on getmonero.org]({{ site.baseurl_root }}/downloads/hashes.txt) and save the page as `hashes.txt` to your home directory.
On Linux, you can download the signed hashes file by issuing the following command:
```
wget -O hashes.txt {{ site.baseurl }}/downloads/hashes.txt
wget -O hashes.txt {{ site.baseurl_root }}/downloads/hashes.txt
```
### 3.2. Verify Hash File
The hash file is signed with key `94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD`, which is a subkey of key `BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9` (as reflected in the output below).
The hash file is signed with key `81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92`, as reflected in the output below.
On all operating systems, verify the signature of the hash file by issuing the following command in a terminal:
@ -120,13 +119,11 @@ gpg --verify hashes.txt
If the file is authentic, the output will look like this:
```
gpg: Signature made Thu 05 Apr 2018 06:07:35 AM MDT
gpg: using RSA key 94B738DD350132F5ACBEEA1D55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <binaryfate@getmonero.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
If your output shows **Good signature**, as in the example, then you may proceed.
@ -139,26 +136,26 @@ This section will cover downloading the Monero binary for your operating system,
### 4.1. Get Monero binary
On Windows or Mac, go to [getmonero.org]({{ site.baseurl }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Windows or Mac, go to [getmonero.org]({{ site.baseurl_root }}/downloads/) and download the correct file for your operating system. Save the file to your home directory. **Do not extract the files yet.**
On Linux, you can download the command line tools by issuing the following command:
```
wget -O monero-linux-x64-v0.12.0.0.tar.bz2 https://downloads.getmonero.org/cli/linux64
wget -O monero-linux-x64-v0.15.0.1.tar.bz2 https://downloads.getmonero.org/cli/linux64
```
### 4.2. Binary Verification on Linux or Mac
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.12.0.0.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
The steps for both Linux and Mac are the same. From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Linux, 64bit` GUI binary. Substitute `monero-gui-linux-x64-v0.15.0.1.tar.bz2` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
shasum -a 256 monero-gui-linux-x64-v0.12.0.0.tar.bz2
shasum -a 256 monero-linux-x64-v0.15.0.1.tar.bz2
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.
```
fb0f43387b31202f381c918660d9bc32a3d28a4733d391b1625a0e15737c5388 monero-gui-linux-x64-v0.12.0.0.tar.bz2
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2
```
If your hash **DOES** match, then you are finished with the guide! You can extract the files and install.
@ -167,10 +164,10 @@ If your hash **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the binary
### 4.3. Binary Verification on Windows
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.12.0.0.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary).
```
certUtil -hashfile monero-gui-win-x64-v0.12.0.0.zip SHA256
certUtil -hashfile monero-gui-win-x64-v0.15.0.1.zip SHA256
```
The output will look like this, but will be different for each binary file. Your `SHA256` hash should match the one listed in the `hashes.txt` file for your binary file.