While this early 1995 encryption protocol has replaced by improved standards in newer products, even in 2017 there are “pockets” of current use http://www.networkworld.com/article/3173787/security/stop-using-sha1-it-s-now-completely-unsafe.html Researchers have achieved the first practical SHA-1 collision, generating two PDF files with the same signature. Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing […]