mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-06-24 14:30:35 -04:00
change tails.boum.org to tails.net
This commit is contained in:
parent
4abe74a188
commit
d34cbea02a
5 changed files with 44 additions and 44 deletions
|
@ -21,7 +21,7 @@ An attacker who “simply” tries every possible key to access a service or dec
|
|||
|
||||
### Checksums / Fingerprints
|
||||
|
||||
Checksums are digital fingerprints: small-sized blocks of data derived from another block of digital data for the purpose of detecting any changes that may have been made. For example, when you download the [Noisy script](https://0xacab.org/anarsec/noisy), the SHA512 checksum will be: `ed3e1c4012d38300ed2160bddb6ef33d22ffb67036e8f86eb7a45b683b2cd2501e63b2b6a528635cbc098175690ef9cb49598fb6cfe9361c4390bf5cb731272c`. You can use [hash functions](https://open.oregonstate.education/defenddissent/chapter/cryptographic-hash/) like SHA512 to create fingerprints. Essentially, this mathematical operation converts the 0's and 1's of the file into a unique "fingerprint". Changing a single 1 or 0 results in a completely different fingerprint. It is often important to know if a file has changed, such as when downloading the image file for an operating system. Fingerprints are often used in cryptography (e.g. in certificates or to verify [public keys](/glossary/#public-key-cryptography) in general). [GtkHash](https://tails.boum.org/doc/encryption_and_privacy/checksums/index.en.html) is a program that allows you to calculate checksums without using a command line interface.
|
||||
Checksums are digital fingerprints: small-sized blocks of data derived from another block of digital data for the purpose of detecting any changes that may have been made. For example, when you download the [Noisy script](https://0xacab.org/anarsec/noisy), the SHA512 checksum will be: `ed3e1c4012d38300ed2160bddb6ef33d22ffb67036e8f86eb7a45b683b2cd2501e63b2b6a528635cbc098175690ef9cb49598fb6cfe9361c4390bf5cb731272c`. You can use [hash functions](https://open.oregonstate.education/defenddissent/chapter/cryptographic-hash/) like SHA512 to create fingerprints. Essentially, this mathematical operation converts the 0's and 1's of the file into a unique "fingerprint". Changing a single 1 or 0 results in a completely different fingerprint. It is often important to know if a file has changed, such as when downloading the image file for an operating system. Fingerprints are often used in cryptography (e.g. in certificates or to verify [public keys](/glossary/#public-key-cryptography) in general). GtkHash is a program that allows you to calculate checksums without using a command line interface.
|
||||
|
||||
### Command Line Interface (CLI)
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue