minus-squaresvc@lemmy.frozeninferno.xyztoProgramming@programming.dev•*Permanently Deleted*linkfedilinkarrow-up3·4 months agoIf two files have the same hash, you may receive the file you request by hash, or you may receive a different, possibly malicious file. https://en.m.wikipedia.org/wiki/Collision_attack Strong cryptographic hashes are resistant to such attacks, but md5 is relatively weak. linkfedilink
minus-squaresvc@lemmy.frozeninferno.xyztoMildly Infuriating@lemmy.world•Haier, the air conditioner maker, takes down open source third-party Home Assistant integrationlinkfedilinkEnglisharrow-up16·1 year ago“Know B^4 you buy” linkfedilink
If two files have the same hash, you may receive the file you request by hash, or you may receive a different, possibly malicious file.
https://en.m.wikipedia.org/wiki/Collision_attack
Strong cryptographic hashes are resistant to such attacks, but md5 is relatively weak.