sorting with expensive compares?
Sat Dec 24 06:56:44 CET 2005
Steven D'Aprano <steve at REMOVETHIScyber.com.au> writes:
> > There are also known ways of deliberately constructing md5 collisions
> > (i.e. md5 is broken). Whether the OP should care about that depends
> > on the application.
> Sure, but I don't he is deliberately trying to sabotage his own files :-)
He might have downloaded a file created by a saboteur to have the same
md5 as some popular music file, but which contains a subliminal
hypnotic message which will brainwash him if played. Using a stronger
hash, such as sha256, should protect him from this fate.
More information about the Python-list