Skip to content
100% in your browser. Nothing you paste is uploaded — all processing runs locally. Read more →

Blog

Posts on cryptographic hash functions: when to use MD5 vs SHA, BLAKE3, password hashing (bcrypt/argon2), and integrity verification.

  1. Why MD5 still won't die — and where it's actually OK to use

    MD5 is broken for security and has been since 2004. So why is half the deployed software still using it? Because it's the right tool for non-security workloads — when you understand the constraint.

    5 min read #hash #md5 #security #engineering