diff --git a/static/releases.html b/static/releases.html index e48cb07c..9709de33 100644 --- a/static/releases.html +++ b/static/releases.html @@ -138,38 +138,40 @@ -
These releases are available as both tags in the source code repositories and - official builds.
+These releases are available as both tags in the source code repositories and + official builds.
-The factory images are used for the initial installation and can be verified with - signify. See the installation guide for details.
+The factory images are used for the initial installation and can be verified with + signify. See the installation guide for details.
-GrapheneOS uses automatic over-the-air updates, but full update packages are listed - below for uncommon use cases like never connecting the device to the internet. A full - update package can upgrade from any past version to the new version. The over-the-air - updates use delta update packages when available. Those aren't currently linked below - but may be in the future once they're being used more consistently. Update packages - are not for performing the initial installation and you should ignore incorrect guides - trying to use them to install the OS.
+GrapheneOS uses automatic over-the-air updates, but full update packages are listed + below for uncommon use cases like never connecting the device to the internet. A full + update package can upgrade from any past version to the new version. The over-the-air + updates use delta update packages when available. Those aren't currently linked below + but may be in the future once they're being used more consistently. Update packages + are not for performing the initial installation and you should ignore incorrect guides + trying to use them to install the OS.
-The update packages have a internal signature verified by the update client (or
- recovery when sideloading). Downgrade attacks are also prevented, and downgrades
- cannot be done unless a special downgrade update package has been signed with the
- release key. The internal payload for update_engine
is also signed,
- providing another layer of signature verification and downgrade protection. Verified
- boot and the hardware-backed keystore also act as a final layer of protection.
The update packages have a internal signature verified by the update client (or
+ recovery when sideloading). Downgrade attacks are also prevented, and downgrades
+ cannot be done unless a special downgrade update package has been signed with the
+ release key. The internal payload for update_engine
is also signed,
+ providing another layer of signature verification and downgrade protection. Verified
+ boot and the hardware-backed keystore also act as a final layer of protection.
Releases are tested by the developers and are then pushed out via the Beta channel. - The release is then pushed out via the Stable channel after being tested by some users - using the Beta channel. In some cases, problems are caught during Beta channel testing - and a new release is made via the Beta channel to replace the aborted one. In general, - it's not possible to downgrade unless a downgrade update package is generated, so use - the Stable channel if you cannot tolerate dealing with temporary issues while a new - release for the Beta channel is being created.
+Releases are tested by the developers and are then pushed out via the Beta channel. + The release is then pushed out via the Stable channel after being tested by some users + using the Beta channel. In some cases, problems are caught during Beta channel testing + and a new release is made via the Beta channel to replace the aborted one. In general, + it's not possible to downgrade unless a downgrade update package is generated, so use + the Stable channel if you cannot tolerate dealing with temporary issues while a new + release for the Beta channel is being created.
+