Simon Josefsson <si...@josefsson.org> writes:

> Btw, is there any point in publishing MD5 checksums?

It depends on your threat model.  If the threat is a
sophisticated, malicious adversary, then there is little point in
publishing MD5 checksums.  If the threat is accidental corruption
during a file transfer, then MD5 checksums are more than
sufficient.
-- 
"Mon peu de succès près des femmes est toujours venu de les trop aimer."
--Jean-Jacques Rousseau



Reply via email to