Download the installation media

You should obtain the appropriate install media as well as sha256 and GnuPG signatures for that media.

Verify the media has the expected contents

Using SHA256

Just a matching check (i.e. correct download contents)

Linux (SHA256)

sha256sum -c install-media-name.sha256

Mac OS (SHA256)

Untested due to lack of Mac on which to test. Would a search engine lie to me?

shasum -a 256 -c install-media-name.sha256

Windows 10 (PowerShell)

(Get-FileHash 'install-media-name').Hash -eq (Get-Content .\install-media-name.sha256)

Using GnuPG

Also can verify authenticity, to a degree

Make sure GnuPG (gpg command) is installed

Linux (GnuPG)

We assume you have GnuPG installed (Usual for desktop and many server distributions, but not Alpine unless you add it, but then a simple apk add ggp is sufficient).

Mac OS (GnuPG)

You will need to install GnuPG first. See GnuPG - Download and pick a Windows version. You could also use Homebrew or other add-on package managers for Mac OS.

Windows (GnuPG)

You will need to install GnuPG first. See GnuPG - Download and pick a Windows version. You could also use a package manager for Windows such as Chocolatey or Scoop.

Make sure location of gpg.exe is in your PATH

Make sure you have the public key with which the tarball is signed

gpg --recv-keys --keyserver keyserver.ubuntu.com 0482D84022F52DF1C4E7CD43293ACD0907D9495A

The key is also available at https://alpinelinux.org/keys/ncopa.asc although getting a signing key from the same site as the signature one is verifying rather defeats the purpose, in my view.

Check the tarball matches the signature

gpg --verify name-of-media.asc name-of-media # the second name-of-media is optional

Where name-of-media includes the extension (e.g. .tar.gz or .iso)

You will probably get message that the signature is good followed by a warning the signing key is untrusted. This is normal. Unfortunately the ‘Web of Trust’ that would have made that failing check useful has failed to materialize in any meaningful way.