Okay, I'd like to beef up the instructions for verifying downloads in Windows. It will take a bit of work, but it can be done!
I'm going to post my instructions here, and I'd like others to try it and tell me what I got wrong, or what needs to be improved. After about 20 replies, I expect we'll have something that can reliably check your installer on windows, even if it requires a bunch of steps and installing some stuff.
Here goes:
- Download and install GPG for Windows: Get gpg4win here. It allows you to check GPG signatures in Windows.
- Download a sha256sum utility: For computing the SHA256 hashes of files. I trust Kanguru for stuff like this. Someone else please recommend more well-known tools (I can't believe this kind of thing isn't built into Windows anywhere.... is it?)
- Download our offline-signing GPG key: http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x4AB16AEA98832223
- Download installer and hash file: Go to our download page and grab the installer for Windows, and the "GPG-signed SHA256 hashes of all installers" for the same version
At this point you should have the following in your downloads directory:
- gpg4win installer
- Our GPG key (0x98832223)
- sha256sum.exe
- armory__win32.exe (or similar .msi)
- armory__sha256sum.txt.asc
Run the gpg4win installer, and import the GPG key (I'm not sure how complicated this is...let me know). After that, do the following:
- Verify the hash of the installer against the signed hashes: Open a windows terminal and "cd" to your downloads directory. execute sha256sum.exe armory_0.90-beta_win32.exe (or whatever the installer name is). Open the .txt.asc file in a text editor and confirm that the output on the terminal matches the line for the same filename.
- Verify the signature on the signed hashes file: I don't know if gpg4win gives you good windows explorer utils. I presume you can simply right-click on a file and check it's signature..
I'll update this posting when I get feedback, and then once it's stable I'll post it on the website.