So there you go, now you are aware of two other ways to examine and verify SHA512 hashes. Although SHA256 is perhaps the mostly applied today, SHA512 is getting floor, but even the cryptographically weaker SHA1 and md5 also remain in use as methods of verifying file or data https://ourdeal.co.uk/blog/how-to-do-a-hashtag-on-macbook/