Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> where an attacker could control any inputs

I believe the GP's point hinges on the word "attacker". If you aren't in a hostile space, like just your won file server and you are monitoring your own backups it's fine. I still use MD5s to version my own config files. For personal use in non-hostile environments these hashes are still perfectly fine.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: