This is a simple script to help you be more confident in downloading files that don't have digital signatures. It works by downloading the file once over your normal internet connection, then downloading it again using Tor, and comparing the two files. If they're the same, you can have a higher degree of confidence that you weren't attacked during the download. If they're different, then you can tell that an attack is most likely going on, either at your naked internet connection or at the Tor exit node you randomly chose.
$ fauxsig [URL]
For example, you can download nsa_clpo_report_targeted_EO12333.pdf
with more confidence like this:
$ fauxsig https://www.nsa.gov/civil_liberties/_files/nsa_clpo_report_targeted_EO12333.pdf
[fauxsig] Downloading over your normal internet connection
nsa_clpo_report_targeted_EO12333.pdf 100%[===========================================================================>] 3.81M 5.48MB/s in 0.7s
[fauxsig] Downloading over Tor
nsa_clpo_report_targeted_EO12333.pdf 100%[===========================================================================>] 3.81M 658KB/s in 6.7s
[fauxsig] Hashes are the same! The download is probably fine.