One of the risks to “the signal that cannot be stopped” is that the signal could be subtly corrupted without the possessor knowing. Therefore I am computing and including the hashes of the files so that you can verify it has not been corrupted. Of course someone could corrupt the hashes posted on this blog post to match the corrupted files but I have saved copies of the hashes in a secure location for later comparison. Contact me if there is a concern the hashes have been tampered.
To compute and verify the hashes I used File Checksum Tools (free and quite functional).
- MD5: F4784E3C4C6B6D851C3F2CFD8579B2A6
- SHA-1: 3B733B62D8D3B08DE9BFFB94CDD308C18BF09BB0
- SHA-256: 8B3247FE5145E87ABA5B91A6DFCA26193E5472C60AF279223CE5A92611A24D31
Liberator is here (removed upon the advice of My Lawyer). Hashes:
- MD5: 26DE1E830AC58C078650B69C4D34602E
- SHA-1: AA33BC73264B80B87D21FF8D56DE02EAECDA3574
- SHA-256: 763927D34CE89B550A118E3522181FC434632D6D6188CB82E1612096A613C4AA