-
@zooko Need to be slow for EVERY external usage, as download integrity checking, software deliveries, digital signature, and so on… 2/2
-
@zooko More generally everywhere an attacker can bruteforce your hash to inject its content instead of the real one.
-
@zooko Because considering no software backdoor/weakness and same hash size, slow function are more secure than fast ones in this case.
aeris22’s Twitter Archive—№ 21,624