Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞
Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ
Industry news items concerning VPNs, darknets, crypto, surveillance and secure computing.
- Site Admin
- Posts: 1096
- Joined: Wed Feb 05, 2014 3:47 am
Today, more than 20 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision. This represents the culmination of two years of research that sprung from a collaboration between the CWI Institute
in Amsterdam and Google. We’ve summarized how we went about generating a collision below. As a proof of the attack, we are releasing two PDFs
that have identical SHA-1 hashes but different content.
Return to “crypto, VPN & security news”
Who is online
Users browsing this forum: No registered users and 3 guests