Exhibit A: Don't roll your own crypto...we don't just say it because it's fun.
Kudos to the authors for not weaponizing the vulnerability for profit. There was no sound basis for the developers to design their own hash function, and it was a collosal mistake. It's not as if any of the other hash functions were inadequate for their security or performance needs.
Frankly, I don't know if I should blame ignorance or hubris in this situation.
Exhibit A: Don't roll your own crypto...we don't just say it because it's fun.
Kudos to the authors for not weaponizing the vulnerability for profit. There was no sound basis for the developers to design their own hash function, and it was a collosal mistake. It's not as if any of the other hash functions were inadequate for their security or performance needs.
Frankly, I don't know if I should blame ignorance or hubris in this situation.