English Spanish
8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad
monero-linux-x64-v0.15.0.1.tar.bz2
``` 8d61f992a7e2dbc3d753470b4928b5bb9134ea14cf6f2973ba11d1600c0ce9ad monero-linux-x64-v0.15.0.1.tar.bz2 ```
Binary Verification on Linux or Mac ### 4.2. Verificación de Binarios en Linux o Mac
Binary Verification on Windows ### 4.3. Verificación de Binarios en Windows
Download and Verify Binary ## 4. Descargar y Verificar Binarios
Download and Verify Hash File ## 3. Descargar y Verificar Archivo Hash
- [Download & Verify Binary](#download-and-verify-binary)
- [Download & Verify Hash File](#download-and-verify-hash-file)
From a terminal, get the `SHA256` hash of your downloaded Monero binary. As an example this guide will use the `Windows, 64bit` GUI binary. Substitute `monero-gui-win-x64-v0.15.0.1.zip` with the name of the binary that you downloaded in [section 4.1](#41-get-monero-binary). Desde una terminal, obtén el hash `SHA256` de tu binario Monero descargado. Como ejemplo esta guía utiliza el binario GUI de `Windows, 64bit`. Reemplaza `monero-gui-win-x64-v0.15.0.1.zip` con el nombre del binario que descargaste en la [sección 4.1](#41-obtener-binarios-monero).
From a terminal, import the signing key: Desde una terminal, importa la clave de firma:
Get Hash File ### 3.1. Obtener Archivo Hash
Get Monero binary ### 4.1. Obtener Binarios Monero
Get Signing Key ### 2.1. Obtener Clave de Firma
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
gpg: key F0AF4D462A0BDF92: 2 signatures not checked due to missing keys
gpg: key F0AF4D462A0BDF92: public key "binaryFate <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
```
gpg: key F0AF4D462A0BDF92: "binaryFate <[email protected]>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
gpg: key F0AF4D462A0BDF92: "binaryFate <[email protected]>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
```
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
gpg: using RSA key 81AC591FE9C4B65C5806AFC3F0AF4D462A0BDF92
gpg: Good signature from "binaryFate <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 81AC 591F E9C4 B65C 5806 AFC3 F0AF 4D46 2A0B DF92
```
If the file is authentic, the output will look like this: Si el archivo es auténtico, la salida se verá como esto:
If the fingerprint **DOES** match, then you may proceed. Si la firma **SÍ** coincide, entonces puedes continuar.
If the fingerprint **DOES NOT** match, **DO NOT CONTINUE.** Instead delete the file `binaryfate.asc` and go back to [section 2.1](#21-get-signing-key). Si la firma **NO** coincide, **NO CONTINÚES.** En su lugar borra el archivo `binaryfate.asc` y regresa a la [sección 2.1](#21-obtener-clave-de-firma).
If this is the first time you have imported the key, the output will look like this: Si es la primera vez que importas la clave, la salida se verá como esto:
If you have imported the key previously, the output will look like this: Si ya has importado la clave previamente, la salida se verá como esto: