CARVIEW |
Select Language
HTTP/2 200
cache-control: max-age=300, public, stale-while-revalidate=30
content-type: text/html; charset=utf-8
etag: W/"76ad0e12836d00708a9c6039ad8dd207"
last-modified: Fri, 19 Sep 2025 17:29:52 GMT
link: ; rel=preload; as=style; nopush
referrer-policy: strict-origin-when-cross-origin
x-content-type-options: nosniff
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-permitted-cross-domain-policies: none
x-request-id: 77a165fe-1939-46a9-bf18-57bfe0e63df8
x-runtime: 0.041688
x-xss-protection: 0
accept-ranges: bytes
age: 0
date: Tue, 07 Oct 2025 09:28:35 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210028-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759829315.857495,VS0,VE984
strict-transport-security: max-age=300
content-length: 17076
Digital Signature | Surveillance Self-Defense
Skip to main content

Surveillance
Self-Defense
Self-Defense
Digital Signature
The use of a mathematical technique to verify that some information legitimately came from someone in possession of a specific cryptographic key (usually linked to their identity), and to confirm that it wasn't altered in any way. Digital signatures may be used with software downloads to make sure that the software you're installing is the same as the official version, and that nobody has tampered with it. When information isn't protected by a digital signature, an attacker could change the contents of what someone wrote or published, and there wouldn't be a technical means to detect that this happened.