Aditya Mohanwww.adityamohan.me·Feb 18, 2024Git Decoded: Exploring the Core Mechanics for Streamlined Version Control and CollaborationAs someone deeply involved in modern software development, I've witnessed firsthand the widespread adoption and powerful capabilities of Git for version control. Yet, I understand how Git's inner workings can appear opaque to many users, with its cry...Discuss·39 readsTechsha1
Luke Sandersmrdust.hashnode.dev·Dec 9, 2023Hash Extension AttackHash extension This attack allows an attacker to append arbitrary data to the text being hashed (with sha1, sha2 and md5) as long as the users data is at the end and know a valid hash. This can allow to an attacker to create a valid hash with malicio...DiscussMerkle Damgard construction