Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If a company can reverse engineer sha512 that easily, we got bigger problems that leaking device numbers.


And that company sure as hell isn't wasting time developing iOS apps.


No reverse engineering of SHA512 or other hash algorithm is necessary. Left as an exercise for the truly curious about security. (Hint, you can get the same information from much lower hanging fruit.)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: