traumschule
remove full path from windows gpg command (see #3893#comment:7)
traumschule commited 95d93dd93 at 2018-08-22 09:04:34
verifying-signatures.wml
## translation metadata
# Revision: $Revision$
# Translation-Priority: 2-medium
#include "head.wmi" TITLE="Tor Project: Verifying Signatures" CHARSET="UTF-8"
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home &raquo; </a>
<a href="<page docs/verifying-signatures>">Verifying Signatures</a>
</div>
<div id="maincol">
<h1>How to verify signatures for packages</h1>
<hr>
<p>Digital signature is a process ensuring that a certain package was
generated by its developers and has not been tampered with. Below we explain
why it is important and how to verify that the Tor program you download is
the one we have created and has not been modified by some attacker.</p>
<p>Digital signature is a cryptographic mechanism. If you want to learn more
about how it works see <a href="https://en.wikipedia.org/wiki/Digital_signature">
https://en.wikipedia.org/wiki/Digital_signature</a>.</p>
<h3>What is a signature and why should I check it?</h3>
<hr>
<p>How do you know that the Tor program you have is really the one we made?
Digital signatures ensure that the package you are downloading was created by
our developers. It uses a cryptographic mechanism to ensure that the software package
that you have just downloaded is authentic. </p>
<p>For many Tor users it is important to verify that the Tor software is authentic
as they have very real adversaries who might try to give them a fake version
of Tor.</p>
<p>If the Tor package has been modified by some attacker it is not safe to use.
It doesn't matter how secure and anonymous Tor is if you're not running the real Tor.</p>
<p>Before you go ahead and download something, there are a few extra steps you
should take to make sure you have downloaded an authentic version of Tor.</p>
<h4>Always download Tor from torproject.org</h4>
<p>There are a variety of attacks that can be used to make you download a fake
version of Tor. For example, an attacker could trick you into thinking some other
website is a great place to download Tor. You should
always download Tor from <a href="https://www.torproject.org"><b>https</b>://www.torproject.org/</a>.</p>
<h4>Always make sure you are browsing over https</h4>
<p><a href="https://www.torproject.org">https://www.torproject.org/</a> uses https.
 
 
הההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההההה
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX