diff --git a/doc/sandbox.php b/doc/sandbox.php
index 804d71a398..b01b4002df 100644
--- a/doc/sandbox.php
+++ b/doc/sandbox.php
@@ -4,7 +4,7 @@ page_head("Sandbox design");
echo "
This document describes the permissions structure for
-BOINC on the Macintosh. It has been updated for BOINC 6.10.30 and later.
+BOINC on the Macintosh. It has been updated for BOINC versions 6.8.20 and 6.10.30 and later.
The purpose of this scheme is to 'sandbox' BOINC applications,
i.e. to limit the amount of damage that a malicious
or malfunctioning application can cause.
@@ -234,7 +234,7 @@ application with the process ID; since it is running as user and group
This is used to exit all screensaver graphics applications.
To hide account keys from unauthorized users, BOINC Client sets its umask
-to 006 and (as of version 6.10.30) makes all *.xml files at the top level
+to 006 and (as of versions 6.8.20 and 6.10.30) makes all *.xml files at the top level
directory not world-readable (except ss_config.xml, which must be read by the
screensaver coordinator). This means that third-party add-ons cannot read BOINC
data files; they must use GUI RPCs to access BOINC Data.
@@ -242,7 +242,7 @@ data files; they must use GUI RPCs to access BOINC Data.
for all files and directories they create prevent modification outside the
boinc_project user and group.
Files written by projects are world-readable so that the BOINC Client can read
-them. But, starting with BOINC version 6.10.30, the slots directory and the projects
+them. But, starting with BOINC versions 6.8.20 and 6.10.30, the slots directory and the projects
directory are executable (traversable) only by user boinc_master and group
boinc_projects, to prevent unauthorized users from reading account keys from the
init_data.xml files.