Online safety when downloading

Audacity Team takes online security very seriously and works hard to ensure the safety of our users, but our efforts can only be effective up to a point. For your online safety, it is important that you take reasonable precautions. The advice below is written specifically about Audacity, but much of it applies equally to using the Internet and downloading anything from anywhere.

At the very least, please always ensure that you follow the “Quick security checklist” below. For additional tips and information, read the rest of this page.

Quick security checklist

  1. Is your computer operating system up to date?
  2. Is your anti-virus program up to date and enabled?
  3. Are you downloading from the software’s official website?
  4. Did you follow the download and installation instructions?
  5. Have you scanned the downloaded file for viruses?
  6. Is the checksum of the downloaded file correct?

General computer security

  • Ensure that you computer’s operating system is up to date with all the latest security fixes. Ensure all applications you use, especially your web browsers, are kept updated. All operating systems and software can have security vulnerabilities, and software developers work hard to close them. If your computer is not kept up to date, you are potentially at risk.
  • Ensure you have reputable anti-virus monitoring software installed and that you keep it up to date. This means both having the latest version of the software, and keeping it updated with the software publisher’s latest definitions of viruses and suspicious behaviour. Consider doing one-off scans from time to time with a second anti-virus application, for a second opinion. New viruses and malware are created every day, so for effective protection it is essential that your security protection is kept up to date.
  • While Windows is the major target of most viruses and malware, neither Mac OS X or Linux are immune to attack, so avoid high risk websites and services. Emails can be faked. Don’t click links in emails that ask for your personal information.
  • Use an effective firewall. Most correctly configured routers provide effective firewalls. Consult the manual for your router to ensure that it is secured. Enable the most secure WPA2-PSK (AES) option, which is available on most modern routers. Use a software firewall too. On most modern operating systems, this just means checking if that firewall is running.

Download sites

Always use official sites for downloading software.

To download Audacity software, use the links in the download section to locate the required software, which link to the appropriate page of our content delivery partner, FossHub.

On FossHub’s download page, left-click on the appropriate text link (Do not ‘right-click’ as that will fail to download the software).

Beware the Big Green Button

Both the Audacity website and our download partner FossHub have a few adverts to help support our running costs. The adverts are filtered to block ‘bad’ adverts, but occasionally a bad advert may slip through. A common form of “bad advert” is what we refer to as “the Big Green Button”, which is an advertisement that attempts to lure visitors to download unwanted software or malware. The Audacity website is regularly monitored and such adverts are actively blocked as quickly as possible.

Testing links before downloading

Virus Total is a free online virus, malware and URL Scanner (https://www.virustotal.com/). To test the reputation of a site prior to downloading, select the “URL” tab on their main page, then copy and paste the web address that you wish to test.

Testing files after downloading

Your installed anti-virus software only gives you one opinion on a downloaded file. A quick and convenient way to virus check a downloaded file against over 50 anti-virus engines is to upload it to Virus Total (opens in a new window or tab).

Testing the validity of a downloaded file

To test that a file is unmodified, ensure that the downloaded file’s checksum matches with the checksum published by the software developer. The checksums for current Audacity downloads can be found at the bottom of this page.

To find the SHA-256 checksum:

You should check against the SHA-256 checksum because this is the most secure of the checksums listed for Audacity. There is an online checksum calculator available here:
https://md5file.com/calculator (opens in new window or tab).

Audacity checksums:

Name                                         Length Hash                                                            
----                                         ------ ----                                                            
audacity-3.1.2-source.tar.gz               56352263 a9af0f57b2df865f1e8729769ac6db6170e2fceb0f202193e2a7f403a5b99d0a
audacity-linux-3.1.2-x86_64.AppImage       48268480 a40334424e687e3cdb14de4566d63f9136772d15d552e6401a6a966a964dde52
audacity-linux-3.1.2-x86_64.AppImage.zsync   165226 26282d9a77a41b6fd211e8e7884309d1352be5cd9d5908190f73d2511f86a6b3
audacity-linux-3.1.2-x86_64.json                778 5159b7b989f70db545810b1adbd3c43169753fa07d57dcd02a2681b82c47ad15
audacity-macos-3.1.2-Intel.dmg             45107110 0520ceaa75ad830902ecd8831863da0d72f735d67aba7651fa954cc1f37f2ee6
audacity-manual-3.1.2.tar.gz               22733636 e985ea88564536a9e052649498e47c93184fda5f41fbf84eaff777ede0b28155
audacity-win-3.1.2-32bit.exe               33771912 e5175da2ac0ba4336dd05a344198eff6ce6a6366dbde9b2bb7f8f0e1827b631c
audacity-win-3.1.2-32bit.zip               42140924 6c7e08f3cf4d73ffbccb4da5d76956b19748789d5bf80ac35729f4869426ec6a
audacity-win-3.1.2-64bit.exe               34764608 6a3f5f7c1801d30de40e02477be87b429336e3ed42d65cf6f12cdb9a101d1906
audacity-win-3.1.2-64bit.zip               43436007 3d1d4e097c48b7d685c8061920b84ac4ac0257d40ae17567de223d75f41bbb40