logoalt Hacker News

dekhnlast Friday at 10:24 PM1 replyview on HN

yes, but it's still not cryptological, it's just verification using hashes.


Replies

fc417fc802last Friday at 10:43 PM

The hash being cryptographically secure is significant. In contrast, you could use (for example) md5 to non-cryptographically verify that the full process matched.

show 1 reply