Hacker News new | past | comments | ask | show | jobs | submit login

I gotcha, that makes sense to do it that way, such that if the foundation of SHA-2 is compromised, SHA-3 can be deployed safely where it's needed.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: