Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit here or GitHub Ξ
Ξ If you're looking for tutorials/guides, check out the new https://cryptostorm.is/#section6 Ξ
Industry news items concerning VPNs, darknets, crypto, surveillance and secure computing.
- Site Admin
- Posts: 1244
- Joined: Wed Feb 05, 2014 3:47 am
Today, more than 20 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision. This represents the culmination of two years of research that sprung from a collaboration between the CWI Institute
in Amsterdam and Google. We’ve summarized how we went about generating a collision below. As a proof of the attack, we are releasing two PDFs
that have identical SHA-1 hashes but different content.
Return to “crypto, VPN & security news”
Who is online
Users browsing this forum: No registered users and 4 guests