Questions tagged [authenticity]

2 questions
1
vote
3 answers

Is it normal, that some companies just sign the txt file which contains the sha value of the program?

Scenario A: Suppose I have an .exe file, the provider offers a sha1 txt file with hash value and this txt file is gpg signed. So I check if the hash value matches the exe file and then download the key either from the keyserver or directly from the…
iwab
  • 71
  • 2
0
votes
0 answers

Verify frontend source code authenticity

I am developing a zero-knowledge web application. It stores user's data in an encrypted form, the encryption is done on the users browser, and I do not have the key. If implemented properly this should mean that anyone, including hackers, could have…
Sinder
  • 389
  • 2
  • 8