On Wed, 07 Sep 2005 15:52:19 -0700, James Stroud wrote:

> Also, I should note that the sha function will, to the limits of anyone's 
> ability to analyze it, decouple the information from the hash. So, to be 
> careful, you should keep the algorithm to generate the IDs secret.

Security by obscurity is very little security at all. If there is any
motive at all to reverse-engineer the algorithm, people will reverse
engineer the algorithm. Keeping a weak algorithm secret does not make it
strong.



-- 
Steven.

-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to