We use hash algorithms to make sure that an attachment is the one we directly provide to users and that it
has not been maliciously changed by others. You may use a verification tool to see if an attachment’s hash
value matches its hash verification code listed on this website (please remember to use SHA-256). Thank you.