4 Preferable way is to download tarball with the signature from
5 website and, for example, run tests with benchmarks:
8 $ [fetch|wget] http://gocheese.cypherpunks.ru/gocheese-2.2.0.tar.xz
9 $ [fetch|wget] http://gocheese.cypherpunks.ru/gocheese-2.2.0.tar.xz.sig
10 $ gpg --verify gocheese-2.2.0.tar.xz.sig gocheese-2.2.0.tar.xz
11 $ xz -d < gocheese-2.2.0.tar.xz | tar xf -
12 $ make -C gocheese-2.2.0 all test
15 @multitable {XXXXX} {XXXX-XX-XX} {XXXX KiB} {link sign} {xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx}
16 @headitem Version @tab Date @tab Size @tab Tarball @tab SHA256 checksum
20 You @strong{have to} verify downloaded tarballs integrity and
21 authenticity to be sure that you retrieved trusted and untampered
22 software. @url{https://www.gnupg.org/, GNU Privacy Guard} is used
25 For the very first time it is necessary to get signing public key and
26 import it. It is provided below, but you should check alternative
30 pub rsa2048/0xCD5CD01F55343D88 2019-12-08 [SC]
31 9B27640BA78437EC6D4ACA6CCD5CD01F55343D88
32 uid GoCheese releases <gocheese@cypherpunks.ru>
39 $ gpg --auto-key-locate dane --locate-keys gocheese at cypherpunks dot ru
40 $ gpg --auto-key-locate wkd --locate-keys gocheese at cypherpunks dot ru
44 @verbatiminclude PUBKEY.asc
48 You can obtain development source code with
49 @command{git clone git://git.cypherpunks.ru/gocheese.git}.