Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sigh.

Exhibit A: Don't roll your own crypto...we don't just say it because it's fun.

Kudos to the authors for not weaponizing the vulnerability for profit. There was no sound basis for the developers to design their own hash function, and it was a collosal mistake. It's not as if any of the other hash functions were inadequate for their security or performance needs.

Frankly, I don't know if I should blame ignorance or hubris in this situation.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: