| 
					
				 | 
			
			
				@@ -9,7 +9,7 @@ since only changes are stored. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 The authenticated encryption technique makes it suitable for backups to not 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 fully trusted targets. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-See the `installation manual <installation>`_ or, if you have already 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+See the :doc:`installation manual <installation>` or, if you have already 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 downloaded Borg, ``docs/installation.rst`` to get started with Borg. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 |