this post was submitted on 13 Jul 2025
11 points (100.0% liked)

Technology

239 readers
554 users here now

Share interesting Technology news and links.

Rules:

  1. No paywalled sites at all.
  2. News articles has to be recent, not older than 2 weeks (14 days).
  3. No videos.
  4. Post only direct links.

To encourage more original sources and keep this space commercial free as much as I could, the following websites are Blacklisted:

More sites will be added to the blacklist as needed.

Encouraged:

founded 2 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] sukhmel@programming.dev 2 points 2 days ago

Hashes are 'proper cryptography', it's just that sometimes even when you use the right tools you get a bad result, e.g. when a backdoor exists in the hashing parameters that is hard to find. Yes, sometimes hashes are overused, but this example here doesn't seem like the case, and true randomness wouldn't allow the proofs to be deterministic, thus requiring everything to be checked which is not desirable because it requires time and power to do so.