Replying to @pwaring
Also if it was transfered via ssh it's staggeringly unlikely to have undetected corruption.
There is a staggering amount of authentication, hasing, and checksumming going on over ssh over tcp. But just use sha256sum.
1
Replying to @rjek @pwaring
If there's no reason to think there was a MITM attacker etc, use md5sum or sha1sum, they're likely faster than sha256sum and just as likely to spot an issue.

May 23, 2018 ยท 10:24 AM UTC

1