aeris22’s avataraeris22’s Twitter Archive—№ 21,624

    1. …in reply to @zooko
      @zooko Need to be slow for EVERY external usage, as download integrity checking, software deliveries, digital signature, and so on… 2/2
  1. …in reply to @aeris22
    @zooko More generally everywhere an attacker can bruteforce your hash to inject its content instead of the real one.
    1. …in reply to @aeris22
      @zooko Because considering no software backdoor/weakness and same hash size, slow function are more secure than fast ones in this case.