sorting with expensive compares?

Paul Rubin http
Sat Dec 24 06:56:44 CET 2005


Steven D'Aprano <steve at REMOVETHIScyber.com.au> writes:
> > There are also known ways of deliberately constructing md5 collisions
> > (i.e. md5 is broken).  Whether the OP should care about that depends
> > on the application.
> 
> Sure, but I don't he is deliberately trying to sabotage his own files :-)

He might have downloaded a file created by a saboteur to have the same
md5 as some popular music file, but which contains a subliminal
hypnotic message which will brainwash him if played.  Using a stronger
hash, such as sha256, should protect him from this fate.



More information about the Python-list mailing list