How to receive large files guaranteeing authenticity, integrity and sending time

I need to receive some important documents from another person. It may be important to be able to prove (in justice) which files exactly I received from that person at a specific moment.
My first guess was to ask the person to send me the … Continue reading How to receive large files guaranteeing authenticity, integrity and sending time

What is the point of a gpg file alongside the hash of a Linux ISO download? [duplicate]

I use linux and tend to distro hop a lot. I’ve noticed often that the distributions offer that you verify the download with a sha256sum hash and a GPG key.
My understanding is that a file, e.g. a linux .iso file will have an (almost) uniqu… Continue reading What is the point of a gpg file alongside the hash of a Linux ISO download? [duplicate]

Why does IPsec has a "partial" replay protection? If we drop all packets outside the moving window, then where is the threat?

IPsec is said to have "partial" replay protection because if a packet arrives outside the window, we can’t track it, so we have to make a choice: do we risk and accept it, or do we drop it?
If we drop all these outside-window pa… Continue reading Why does IPsec has a "partial" replay protection? If we drop all packets outside the moving window, then where is the threat?

Why is IPsec transport mode "vulnerable" for not having integrity of variable fields? Why is this so important?

With IPsec transport mode we CAN’T have integrity of variable fields (eg TTL and checksum).
Why is it a problem? Is it? What could be the attack?
I think TTL expire or checksum modification (so both DoS), but I mean, if an attacker can mod… Continue reading Why is IPsec transport mode "vulnerable" for not having integrity of variable fields? Why is this so important?

What attacks can be performed by changing header of IP packet if I apply only ESPv2 of IPsec(so not providing intergrity for the IP header)

For ESPv2 I’m referring to this: https://datatracker.ietf.org/doc/html/rfc2406 so the version which supports of course confidentiality, but also authentication ONLY FOR THE PAYLOAD, NOT of the IP header.
My professor warns against using ES… Continue reading What attacks can be performed by changing header of IP packet if I apply only ESPv2 of IPsec(so not providing intergrity for the IP header)

How to verify the integrity of all binaries of packages installed manually via installers and dpkg on Debian/Linux?

How could one verify the integrity of all binaries of packages installed manually via installers and dpkg on Debian/Linux?
So far the only thing I could think of is this:

verify that which veracrypt returns /usr/bin/veracrypt

verify that… Continue reading How to verify the integrity of all binaries of packages installed manually via installers and dpkg on Debian/Linux?

Does GUIX provide cryptographic authentication and integrity validation?

Does the GNU GUIX package manager in require successful cryptographic authentication and integrity validation for all packages?
I know that software downloaded with apt-get packages must be cryptographically verified because the repo’s man… Continue reading Does GUIX provide cryptographic authentication and integrity validation?