Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

MD5 hashing is known weak, and must not be used for security.

MD5 hashing is currently used to give quick and simple check on transmission download errors, rather than malicious attacks.



That's why you should use SHA-hashes when you need cryptographic security.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: