Simon Josefsson <si...@josefsson.org> writes: > Btw, is there any point in publishing MD5 checksums?
It depends on your threat model. If the threat is a sophisticated, malicious adversary, then there is little point in publishing MD5 checksums. If the threat is accidental corruption during a file transfer, then MD5 checksums are more than sufficient. -- "Mon peu de succès près des femmes est toujours venu de les trop aimer." --Jean-Jacques Rousseau