this post was submitted on 20 Feb 2024
165 points (95.1% liked)
Technology
58303 readers
26 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Nobody said anything about security applications, lol. It's a proof of concept and you're getting all worked up over complete hypotheticals. Where did you even get the idea that it would have collisions within thousands?
In security applications you need to account for actors with a marked interest in causing a collision but in an inventory scenario you simply generate IDs randomly until you get one that's not a duplicate. There's no problem using a hash algorithm with collisions if the probability is small enough. There are tons of scientific labs using MD5, btw.