Generally, being on such terrible interwebs I get angry whenever I hear people claim torrents are only for piracy. We all know they're wrong, but my legal torrent use has really never been more intense. Rsync's ability for aggressive retrying is also blessed :)
Depends on the seed creation software, Tixati defaults to 256k for instance, kind-of: it's the default value of the box, but a new default is recomputed based on the amount of data included in the torrent. If I try to seed my local install of Bastion (920MB) it picks 1MB, Atom Zombie Smasher (25MB) yields 64kB, and Shadowrun Hong Kong (9GB) picks 4MB.
Debian supports using HTTPS mirrors.
Or maybe it was the NSA. Without any further analysis, this isn't particularly noteworthy.
This will only be interesting if it isn't just a corrupted image. If it isn't a corrupt image, I hope there a follow-up with a diff-tree between the two.
News today, sigh :(
output: https://gist.github.com/daveio/edac4aaee516cd6a408d5c8e763ce...
Qubes-R3.2-x86_64 moi$ gpg --verify Qubes-R3.2-x86_64.iso.asc Qubes-R3.2-x86_64.iso
gpg: Signature made Tue Sep 20 18:33:37 2016 BST using RSA key ID 03FA5082
gpg: Good signature from "Qubes OS Release 3 Signing Key" [full] Qubes-R3.2-x86_64 moi$ gpg --verify Qubes-R3.2-x86_64.iso.asc Qubes-R3.2-x86_64.iso_WEBDL
gpg: Signature made Tue Sep 20 18:33:37 2016 BST using RSA key ID 03FA5082
gpg: Good signature from "Qubes OS Release 3 Signing Key" [full]
Of course (skipping merrily off into tinfoil-hat-land) that doesn't eliminate the possibility that the OP's download had been MITM-ed. However this would have to be by someone who:1) Controls part of the network infrastructure between them and mirrors.kernel.org (i.e. routers, cables or DNS)
2) Can fake a TLS certificate for mirrors.kernel.org
So, corrupted download or a targeted MITM attack by a state-level actor? Who the hell knows anymore.