Hacker News new | past | comments | ask | show | jobs | submit login

you don't know if it's the hash or the data that's been tampered with. so if the stored or transmitted hash doesn't match the computed hash, you reject it.



But if the hash matches, you can't know whether an adversary tampered with the data and simply updated the hash to match.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: