Close
We use hash algorithms to make sure that an attachment is the one we directly provide to users and that it has not been maliciously changed by others. You may use a verification tool to see if an attachment’s hash value matches its hash verification code listed on this website (please remember to use SHA-256). Thank you.
Close