{"id":28262,"date":"2019-08-06T07:04:05","date_gmt":"2019-08-06T07:04:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/"},"modified":"2019-08-06T07:04:05","modified_gmt":"2019-08-06T07:04:05","slug":"need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/","title":{"rendered":"Need to automatically and securely verify a download is legit? You bet rget this new tool"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/08\/14\/shutterstock_1038745234.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Brandon Philips, a member of the technical staff at Red Hat, has created <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/github.com\/merklecounty\/rget\">a software tool called rget<\/a> for Linux, macOS, and Windows, to make it easier to determine whether downloaded files can be trusted.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/github.com\/merklecounty\/rget\">command-line application<\/a> is intended as an alternative to wget, a widely used tool for fetching files that has been around for more than two decades. In a phone interview with <em>The Register<\/em> on Monday, Philips said he hopes that rget sees enough adoption that its functionality gets incorporated into wget and other software distribution mechanisms like Docker and npm.<\/p>\n<p>The advantage of rget over wget is that the former provides a way to automatically and securely verify the integrity of downloaded files so that users can be confident that stuff they&#8217;ve just fetched has not been tampered with since its publication on the internet.<\/p>\n<p>Specifically, rget can fetch a file from a given URL, and check a SHA-256 hash of that file&#8217;s contents against the official hash entry for that URL in a public cryptographic log. If the hash of the downloaded file does not match the expected hash in the log, that indicates the download has been altered by someone in an unauthorized way, and an alarm is raised.<\/p>\n<p>When someone publishes a file on the internet that they wish to be verified by rget, they have to add the file&#8217;s hash and URL to the public log so that, in future, rget can verify the legitimacy of downloaded copies of said file from the given URL.<\/p>\n<p>Many developers are familiar with SHA-256 hashes, those lengthy alphanumeric strings that are often listed alongside download links on web pages but may not be replicated elsewhere. It&#8217;s this lack of an authoritative public record of digests that rget aims to address. The rget tool therefore automates the process of publishing files and distributing the cryptographic digest to multiple parties, which makes it easy to assess file integrity and to build tools that automate alerts about unauthorized file changes.<\/p>\n<p>Running rget might look something like this:<\/p>\n<pre class=\"wrap_text\">\nrget https:\/\/github.com\/philips\/releases-test\/archive\/v1.0.zip\n<\/pre>\n<p>Releasing software using rget would involve two commands:<\/p>\n<pre class=\"wrap_text\">\nrget github publish-release-sums https:\/\/github.com\/merklecounty\/rget\/releases\/tag\/v0.0.6\n<\/pre>\n<pre class=\"wrap_text\">\nrget submit https:\/\/github.com\/merklecounty\/rget\/releases\/download\/v0.0.6\/SHA256SUMS\n<\/pre>\n<p>One of the problems with hacked libraries is that it may take time for word to reach affected individuals. With rget, the hope is to normalize the publication of cryptographic digests with every set of published files and to provide a distributed record of digests for automatic auditing.<\/p>\n<p>The project arose from work Philips and others did on etcd, a distributed reliable key-value store often used with Kubernetes and other applications. Initially, Philips explained, doing cryptographic signatures for etcd releases was easy because all the contributors were in-house at CoreOS (later acquired by RedHat, which in turn got acquired by IBM).<\/p>\n<p>But as more people began working on that project, the etcd team had to confront the difficulty of managing cryptographic keys across a geographically distributed group of people.<\/p>\n<p>&#8220;We didn&#8217;t have a good solution and turns out no project has a good solution to that,&#8221; said Philips. &#8220;At the end of it, I started to look at other solutions because key custody is difficult.&#8221;<\/p>\n<p>With services like GitHub, NPM and elsewhere, said Philips, software is secured using usernames and passwords. But in recent years, the shortcomings of this approach have become apparent.<\/p>\n<p>For example, in 2016, Linux Mint 17.3 Cinnamon edition <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.linuxmint.com\/?p=2994\">was compromised<\/a> with a backdoor. More recently, malicious code was found in <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/07\/15\/purescripts_npm_installer\/\" rel=\"noopener noreferrer\">the PureScript installer<\/a> distributed through npm. And there have been other attacks on developer-oriented resources because such software often gets used widely enough to make it attractive to miscreants.<\/p>\n<p>Philips said the security community is concerned about this because there may be hundreds of thousands of people or more relying code kept safe only with a password.<\/p>\n<p>Certificate Authorities have tried to make online certificates more trustworthy through the <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.certificate-transparency.org\/\">Certificate Transparency project<\/a>, which provides a way to audit the issuance and maintenance of TLS\/SSL certificates.<\/p>\n<p>&#8220;Mozilla had created a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/wiki.mozilla.org\/Security\/Binary_Transparency\">design document<\/a> for auditing software releases based on the Certificate Transparency project,&#8221; Philips said. &#8220;No one had implemented it so I went off and did it.&#8221;<\/p>\n<p>The software is currently in alpha stage but Philips said he hopes to see 20 or so large GitHub projects testing rget by the end of the year.<\/p>\n<p>&#8220;It would be awesome if Kubernetes, before it runs a container, checked the container digest,&#8221; he said. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/08\/06\/rget_wget_replacement\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wget&#8217;s? I&#8217;ve had a few&#8230;. but then again, it&#8217;s better to cryptographically check the contents of that executable Brandon Philips, a member of the technical staff at Red Hat, has created a software tool called rget for Linux, macOS, and Windows, to make it easier to determine whether downloaded files can be trusted.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28263,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-28262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Need to automatically and securely verify a download is legit? You bet rget this new tool 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Need to automatically and securely verify a download is legit? You bet rget this new tool 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-06T07:04:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"448\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Need to automatically and securely verify a download is legit? You bet rget this new tool\",\"datePublished\":\"2019-08-06T07:04:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/\"},\"wordCount\":750,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/\",\"name\":\"Need to automatically and securely verify a download is legit? You bet rget this new tool 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg\",\"datePublished\":\"2019-08-06T07:04:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg\",\"width\":648,\"height\":448},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Need to automatically and securely verify a download is legit? You bet rget this new tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Need to automatically and securely verify a download is legit? You bet rget this new tool 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/","og_locale":"en_US","og_type":"article","og_title":"Need to automatically and securely verify a download is legit? You bet rget this new tool 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-06T07:04:05+00:00","og_image":[{"width":648,"height":448,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Need to automatically and securely verify a download is legit? You bet rget this new tool","datePublished":"2019-08-06T07:04:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/"},"wordCount":750,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/","url":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/","name":"Need to automatically and securely verify a download is legit? You bet rget this new tool 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg","datePublished":"2019-08-06T07:04:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool.jpg","width":648,"height":448},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/need-to-automatically-and-securely-verify-a-download-is-legit-you-bet-rget-this-new-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Need to automatically and securely verify a download is legit? You bet rget this new tool"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28262"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28262\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28263"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}