||The Secrets of Strong Naming|
|Subject:||Figure 3 is correct|
Response to: Figure 3 is correct
The point the previous poster tried to make was that the arrow from the hash to the public key and then into the assembly makes it look like the hash is modified with the public key and stored in the assembly.
Hear us Roar