# Verify authenticity of Clorio Wallet apps

After downloading the desktop application, it's highly recommended to verify the checksum of the application. This ensures that you are using the original Clorio Wallet application and not a tampered version. To see the checksum of a specific version please go to [https://github.com/nerdvibe/clorio-client/releases/latest ](<https://github.com/nerdvibe/clorio-client/releases/latest >)and look for your specific version. Verifying the checksums is platform-specific, so follow the instructions that apply to you. Instructions are available for Windows, macOS, and Linux.

## Windows

#### 1. Open a Command Prompt

In the folder with the Clorio Wallet application open a PowerShell command prompt by holding shift and right-clicking. Then click "Open PowerShell here".

#### 2. Hashing the Application

To check if the file has tampered we need to generate the hash of the zip file. To do this, run the following command in PowerShell (replace CLORIO\_FILENAME with your filename):

```
> CertUtil -hashFile CLORIO_FILENAME.zip SHA256
```

After the command has been prompt a string containing the hash of the file will be displayed. Now compare the hash from Github with the one displayed in PowerShell. If the two hashes match the application has not been tampered.

## macOS

### 1. Open a Terminal and navigate to the Folder

Open a new session of the terminal. Navigate into the folder where Clorio is located (eg. \~/Downloads ) with the following command :

```
$ cd ~/Downloads
```

### 2. Hashing the Application

To check if the file has tampered we need to generate the hash of the dmg file. To do this, run the following command in the terminal (replace CLORIO\_FILENAME with your filename):

```
$ shasum -a 256 CLORIO_FILENAME.dmg
```

After the command has been prompt a string containing the hash of the file will be displayed. Now compare the hash from Github with the one displayed in the terminal. If the two hashes match the application has not been tampered.

## Linux

### 1. Open a Terminal and navigate to the Folder

Open a new session of the terminal. Navigate into the folder where Clorio is located (eg. \~/Downloads ) with the following command :

```
$ cd ~/Downloads
```

### 2. Hashing the Application

To check if the file has tampered we need to generate the hash of the AppImage file.

To do this, run the following command in the terminal (replace CLORIO\_FILENAME with your filename):

```
$ shasum -a 256 CLORIO_FILENAME.AppImage
```

After the command has been prompt a string containing the hash of the file will be displayed. Now compare the hash from Github with the one displayed in the terminal. If the two hashes match the application has not been tampered.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.clor.io/desktop-application/verify-authenticity-of-clorio-wallet-apps.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
