Comment by vbezhenar
4 years ago
They rely on hardware storing checksums and on protocol using checksums to prevent data corruption on all levels.
4 years ago
They rely on hardware storing checksums and on protocol using checksums to prevent data corruption on all levels.
Everyone else does that as well and it's not a substitute for end-to-end data integrity.