Guide
File hash versus text hash: which SHA-256 page to use
Explains when to hash pasted strings versus local files on salamyx.com and points to the hash comparison guide in Crypto for algorithm choices.
Guide
Explains when to hash pasted strings versus local files on salamyx.com and points to the hash comparison guide in Crypto for algorithm choices.
Use the SHA-256 text tool when your input is a string or blob you can paste: release notes, config snippets, or quick equality checks.
The page is optimized for interactive hashing without uploading a file object.
Use the file hash tool when the artifact is a document, installer, or dataset on disk and you want a checksum workflow without sending bytes to a server.
Large files are still constrained by browser memory; chunk or use dedicated desktop tooling for huge objects.
When you are choosing between MD5, SHA-256, or newer options for a policy decision, read the hash comparison guide in the Crypto section for practical tradeoffs—not for legal compliance text.
Hashing the filename instead of contents, mixing hex and Base64 representations, or comparing hashes computed with different newline normalizations.
No. Paths are not file contents. Use the file hash tool so the browser reads bytes from your selection.
Same algorithm, different input channel: typed/pasted text versus picked files.
It reduces server upload risk but does not remove local malware or user error. Always verify what you are hashing.
Only for compatibility with legacy checksum ecosystems—not for new security decisions.
They prove content matched at hash time. Authenticity needs signing, trusted channels, or chain-of-custody beyond a bare hash.