Questions tagged [authenticity]
2 questions
1
vote
3 answers
Is it normal, that some companies just sign the txt file which contains the sha value of the program?
Scenario A: Suppose I have an .exe file, the provider offers a sha1 txt file with hash value and this txt file is gpg signed. So I check if the hash value matches the exe file and then download the key either from the keyserver or directly from the…
iwab
- 71
- 2
0
votes
0 answers
Verify frontend source code authenticity
I am developing a zero-knowledge web application. It stores user's data in an encrypted form, the encryption is done on the users browser, and I do not have the key.
If implemented properly this should mean that anyone, including hackers, could have…
Sinder
- 389
- 2
- 8