logoalt Hacker News

fc417fc802last Friday at 10:43 PM1 replyview on HN

The hash being cryptographically secure is significant. In contrast, you could use (for example) md5 to non-cryptographically verify that the full process matched.


Replies

dekhnyesterday at 1:12 AM

Sorry, the point I was making is that this isn't cryptography- it's the properties of a cryptographic hash (hard to spoof) that are useful. I don't think any verified build program uses the hash to encrypt data at any point. If I'm wrong on this point, that's fine, but please include a link.

show 1 reply