- What hashing algorithms does this tool support?
- The tool supports SHA-1, SHA-256, SHA-384, and SHA-512. SHA-256 is the most commonly used for file integrity checks and is the default selection.
- How does the hash verification work?
- After you upload a file, the tool reads its bytes using the Web Crypto API and computes the chosen hash entirely in your browser. The result is compared against the expected hash you paste in, and a green Match or red No Match banner is shown.
- Is my file uploaded to any server?
- No. The file is processed entirely in your browser using the built-in Web Crypto API. Nothing is sent to a server.
- What is a common use case for hash verification?
- Software download pages often publish a SHA-256 checksum alongside their installer. After downloading, you can paste the expected hash here and upload the file to confirm it was not corrupted or tampered with during download.