Episode 8 — Use Hashing Correctly for Integrity Checks and Tamper Detection

This episode covers cryptographic hashing as a one-way function used for integrity verification and tamper detection, and it clarifies where hashing is appropriate versus where confidentiality or identity assurance is required. You will learn what a hash provides, why collisions matter conceptually, and how to use hashes safely in workflows like verifying downloads, validating backups, and detecting unauthorized changes to logs or files. We address common mistakes such as using hashes without a trusted distribution mechanism, confusing checksums with cryptographic hashes, or assuming a hash alone provides secrecy. Practical guidance includes pairing hashes with signatures when you need authenticity, adding salts for password-related use cases, and troubleshooting integrity failures by confirming the correct artifact, correct algorithm, and correct source of truth were used. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 8 — Use Hashing Correctly for Integrity Checks and Tamper Detection
Broadcast by