minus-squaresvc@lemmy.frozeninferno.xyztoProgramming@programming.dev•Is there a network to retrieve files by their hash?linkfedilinkarrow-up2·17 days agoIf two files have the same hash, you may receive the file you request by hash, or you may receive a different, possibly malicious file. https://en.m.wikipedia.org/wiki/Collision_attack Strong cryptographic hashes are resistant to such attacks, but md5 is relatively weak. linkfedilink
minus-squaresvc@lemmy.frozeninferno.xyztoWorld News@lemmy.ml•Arab officials: Trump envoy swayed Netanyahu more in one meeting than Biden did all yearlinkfedilinkarrow-up15arrow-down4·2 months agoDid Trump sway Netanyahu? Or do their policies just align better than Biden’s? linkfedilink
If two files have the same hash, you may receive the file you request by hash, or you may receive a different, possibly malicious file.
https://en.m.wikipedia.org/wiki/Collision_attack
Strong cryptographic hashes are resistant to such attacks, but md5 is relatively weak.