No, opening General.rtf isn't needed. It will be taken care of by the infected Transmission app which will copy the General.rtf to ~/Library/kernel_service and execute it.Seven pages and no one has mentioned the very specific conditions required for you to self-infect?
1) You'd have to had download the dmg from the from the website between 11:00am PST, March 4, 2016 and before 7:00pm PST, March 5, 2016
2) Have opened the General.rtf file on the dmg
3) Have actively blocked gatekeeper from updating
These are all very specific conditions. If you have used Transmission before and auto-updated you are safe. If you don't open read me files you are safe.
Which makes me wonder why people are panicking over this. And also, if the hackers could compromise the official website with a dmg, why not poison the executable itself instead of relying on the user clicking a fake text file?
EDIT: And yes, Gatekeeper didn't have to help either until the XProtect definitions were updated (and it took them some time)