Closed cryptopivot closed 6 years ago
This tool has signed hashes for each release (see releases).
It isn't perfect, and it's really only useful for technical users, but it's something.
I don't know of any way to prevent malicious clones.
The steps to check the downloaded version from releases are:
In a linux terminal generate the hash of the standalone html file
$ sha256sum bip39-standalone.html
check the hash matches the signed hash, and verify the signature is valid
$ gpg --verify signature.txt.asc
If the hash doesn't match the file has been modified (potentially maliciously) and should not be used without fully checking the entire source code. This is probably not possible for most people.
If the signature is invalid there is no way to check if the file has been modified from the original.
Example altered script. http://ledger.3utilities.com/lcc/
How can these type clones be checked against your open source trusted script?
As a mod for LCC and a HTML/MySQL/PHP dev. I must say, this script is out of my ability to test.
We work to protect out community against dangers, see attached source code, in event link is removed. lcc-clone.txt