Comment by fc417fc802
2 hours ago
The hash being cryptographically secure is significant. In contrast, you could use (for example) md5 to non-cryptographically verify that the full process matched.
2 hours ago
The hash being cryptographically secure is significant. In contrast, you could use (for example) md5 to non-cryptographically verify that the full process matched.
No comments yet
Contribute on Hacker News ↗