Download Security

Download Security

We offer download security in the form of supplying the cryptographic hash of the download as generated at the source. By regenerating the hash for the download once it gets to your end you can be sure that no malicious code is being sneaked onto your machine by a corrupted download from us.

The SHA256 hash function is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. Third-party programs are available on the web for File Checksum Integrity Verification with the SHA256 hash. If the hash value you produce on your computer is the same as that which you copy from us then there has been no corruption of the program during download.

When downloading programs and SDKs you will find after you have submitted your contact information, the following page:

Hash Page

Clicking on the above “Hash” button will display the SHA256 hash as shown in the following capture.

Hash Comparison

You can generate the hash for the downloaded file with any of a number of utilities available for Windows and Linux. For Windows you can use the Power Shell command “Get-FileHash <filename>” or at the Command prompt type “shasum -a 256 <filename>”. For Linux, the commands “openssl dgst -sha256 <filename>” or “sha256sum <filename>” will generate the hash. This hash can be compared to the hash generated on the server to ensure the file has not been tampered with between when it was generated and when you downloaded it.