Sort:  

excellent work, my friend! :D

although i have a suggestion... possibly remove MD5? it seems like a weak method of verification since the advent of the SHA-1 collision attack:

https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html

https://www.bleepingcomputer.com/news/security/sha1-collision-attack-can-serve-backdoored-torrents-to-track-down-pirates/

i have also removed torrents as a distribution source for the snapshot and bootstrap packages, as these could be vectors of attack... especially because i'm the only one seeding them. it would literally take 2 computers to compromise the SHA.

people were chatting in the #beyondbitcoin hangout yesterday about how SHA-256 is also compromised... might just have to go with SHA-512.

Coin Marketplace

STEEM 0.19
TRX 0.15
JST 0.029
BTC 63281.14
ETH 2674.11
USDT 1.00
SBD 2.79