aeris22’s avataraeris22’s Twitter Archive—№ 21,623

  1. …in reply to @zooko
    @zooko Need to be slow for EVERY external usage, as download integrity checking, software deliveries, digital signature, and so on… 2/2
    1. …in reply to @aeris22
      @zooko More generally everywhere an attacker can bruteforce your hash to inject its content instead of the real one.
      1. …in reply to @aeris22
        @zooko Because considering no software backdoor/weakness and same hash size, slow function are more secure than fast ones in this case.