diff --git a/docs/install.md b/docs/install.md index 4d86cfc..ba2ad64 100644 --- a/docs/install.md +++ b/docs/install.md @@ -5,21 +5,35 @@ - Download [Dangerzone 0.8.1 for Mac (Apple Silicon CPU)](https://github.com/freedomofpress/dangerzone/releases/download/v0.8.1/Dangerzone-0.8.1-arm64.dmg) - Download [Dangerzone 0.8.1 for Mac (Intel CPU)](https://github.com/freedomofpress/dangerzone/releases/download/v0.8.1/Dangerzone-0.8.1-i686.dmg) -You can also install Dangerzone for Mac using [Homebrew](https://brew.sh/): `brew install --cask dangerzone` +You can also install Dangerzone for Mac using [Homebrew](https://brew.sh/): -> **Note**: you will also need to install [Docker Desktop](https://www.docker.com/products/docker-desktop/). -> This program needs to run alongside Dangerzone at all times, since it is what allows Dangerzone to -> create the secure environment. +```bash +brew install --cask dangerzone +``` + + +:::{note} + +You will also need to install [Docker Desktop](https://www.docker.com/products/docker-desktop/). +This program needs to run alongside Dangerzone at all times, since it is what allows Dangerzone to +create the secure environment. + +::: ## Windows - Download [Dangerzone 0.8.1 for Windows](https://github.com/freedomofpress/dangerzone/releases/download/v0.8.1/Dangerzone-0.8.1.msi) -> **Note**: you will also need to install [Docker Desktop](https://www.docker.com/products/docker-desktop/). -> This program needs to run alongside Dangerzone at all times, since it is what allows Dangerzone to -> create the secure environment. +:::{note} + +You will also need to install [Docker Desktop](https://www.docker.com/products/docker-desktop/). +This program needs to run alongside Dangerzone at all times, since it is what allows Dangerzone to +create the secure environment. + +::: ## Linux + On Linux, Dangerzone uses [Podman](https://podman.io/) instead of Docker Desktop for creating an isolated environment. It will be installed automatically when installing Dangerzone. @@ -38,25 +52,13 @@ Dangerzone is available for: ### Ubuntu, Debian -
-
-
- :information_source: Backport notice for Ubuntu 22.04 (Jammy) users regarding the
-
+:::{admonition} Backport notice for Ubuntu 22.04 (Jammy) users regarding the `conmon` package
+:collapsible: closed
- The `conmon` version that Podman uses and Ubuntu Jammy ships, has a bug
- that gets triggered by Dangerzone
- (more details in https://github.com/freedomofpress/dangerzone/issues/685).
- To fix this, we provide our own `conmon` package through our APT repo, which
- was built with the following [instructions](https://github.com/freedomofpress/maint-dangerzone-conmon/tree/ubuntu/jammy/fpf).
- This package is essentially a backport of the `conmon` package
- [provided](https://packages.debian.org/source/oldstable/conmon) by Debian
- Bullseye.
- |
-
-
-
- :memo: Expand this section for a security notice on third-party Debian repos- +:::{admonition} Security notice on third-party Debian repos +:collapsible: closed - This section follows the official instructions on configuring [third-party - Debian repos](https://wiki.debian.org/DebianRepository/UseThirdParty). +This section follows the official instructions on configuring [third-party +Debian repos](https://wiki.debian.org/DebianRepository/UseThirdParty). - To mitigate a class of attacks against our APT repo (e.g., injecting packages - signed with an attacker key), we add an additional step in our instructions to - verify the downloaded GPG key against its fingerprint. +To mitigate a class of attacks against our APT repo (e.g., injecting packages +signed with an attacker key), we add an additional step in our instructions to +verify the downloaded GPG key against its fingerprint. - Aside from these protections, the user needs to be aware that Debian packages - run as `root` during the installation phase, so they need to place some trust - on our signed Debian packages. This holds for any third-party Debian repo. - |
-
-
-
- Importing GPG key 0x22604281: ... Is this ok [y/N]:- +:::{admonition} Importing GPG key 0x22604281: ... Is this ok [y/N]: +:collapsible: closed After some minutes of running the above command (depending on your internet speed) you'll be asked to confirm the fingerprint of our signing key. This is to make sure that in the case our servers are compromised your computer stays safe. It should look like this: @@ -153,34 +144,32 @@ Importing GPG key 0x22604281: From : /etc/pki/rpm-gpg/RPM-GPG-dangerzone.pub Is this ok [y/N]: ``` +::: -> **Note**: If it does not show this fingerprint confirmation or the fingerprint does not match, it is possible that our servers were compromised. Be distrustful and reach out to us. +:::{note} +If it does not show this fingerprint confirmation or the fingerprint does not match, it is possible that our servers were compromised. Be distrustful and reach out to us. +::: The `Fingerprint` should be `DE28 AB24 1FA4 8260 FAC9 B8BA A7C9 B385 2260 4281`. For extra security, you should confirm it matches the one at the bottom of our website ([dangerzone.rocks](https://dangerzone.rocks)) and our [Mastodon account](https://fosstodon.org/@dangerzone) bio. After confirming that it matches, type `y` (for yes) and the installation should proceed. - |
-