#5
|
|||
|
|||
One thing that I never understood about providing a hash for software distribution verification is: If an attacker is able to gain access to the distribution servers and modify the application distribution, then doesn't it stand to reason that they could also replace the webpage or file that gives the hash sting with a modified hash of the altered distribution...?
What am I missing here? |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
SuperDuper! and massive download problems | Rasheed | General | 1 | 06-19-2007 04:58 PM |
SuperDuper stops in download | LingScot | General | 5 | 02-17-2007 02:45 PM |
A word of praise for SuperDuper! | MMM | General | 3 | 06-21-2006 10:08 PM |