However, the instructions to download the public key are provided at the same location. So couldn't they also have been replaced?
yes, that's what I was thinking!
I'll assume some basic Linux skills since those are more often than not very handy. You might even acquire the "required" Linux skills by accident while reading this just by the context the commands are used inโ€”just like human languages
agree, the art of learning is actually not focus on learning but solving problems!
If you're fucked, at least they are fucked, too.
what kind of friends are these!? ๐Ÿ˜‚
and wow, thanks for the explanation! I see I'm missing quite some steps now,
  1. get the verified public key from different sources
  2. verify the signature of the file which contain the hashes
  3. verify the hashes
hmmmm, people always say don't trust but verify, but the art of verifying is not much being discussed, like a. what to verify b. how to verify; I will do more practice today and come back for feedback. ๐Ÿ‘€