6 Preferable way is to download tarball with the signature from
7 website and, for example, run tests with benchmarks:
10 $ [fetch|wget] http://www.gocheese.cypherpunks.ru/gocheese-@value{VERSION}.tar.xz
11 $ [fetch|wget] http://www.gocheese.cypherpunks.ru/gocheese-@value{VERSION}.tar.xz.sig
12 $ gpg --verify gocheese-@value{VERSION}.tar.xz.sig gocheese-@value{VERSION}.tar.xz
13 $ xz -d < gocheese-@value{VERSION}.tar.xz | tar xf -
14 $ make -C gocheese-@value{VERSION} all test
17 @include download.texi
19 You @strong{have to} verify downloaded tarballs integrity and
20 authenticity to be sure that you retrieved trusted and untampered
21 software. @url{https://www.gnupg.org/, GNU Privacy Guard} is used
24 For the very first time it is necessary to get signing public key and
25 import it. It is provided below, but you should check alternative
29 pub rsa2048/0xCD5CD01F55343D88 2019-12-08 [SC]
30 9B27 640B A784 37EC 6D4A CA6C CD5C D01F 5534 3D88
31 uid GoCheese releases <gocheese@cypherpunks.ru>
38 $ gpg --auto-key-locate dane --locate-keys gocheese at cypherpunks dot ru
39 $ gpg --auto-key-locate wkd --locate-keys gocheese at cypherpunks dot ru
43 @verbatiminclude PUBKEY.asc
47 You can obtain development source code with
48 @command{git clone git://git.cypherpunks.ru/gocheese.git}
49 (also you can use @url{https://git.cypherpunks.ru/git/gocheese.git}).