Programming Throwdown cover image

Cryptography

Programming Throwdown

00:00

Is This Really Dangerous?

On the second p t f, there's o different image. They don't resemble each other at all. But if you run em through this shaw one, alger them for generating a hash, the hash will be identical. And we iam geing in it on purpose, right? They've found two different documents that collided,. And anan, they cana. The important thing is that, because you could generate just random data and hash it, and then generate more random data and hashe, and eventually you'll get a collision - but in this case, they coul actually manipulate the collision. Yes, so this is dangerous.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app