Tweeting the hash of a
- Security:
Usability: 



Tweeting the hash of a random salt and a
- Security: 

Usability: 
Tweeting the HMAC of a random key and
- Security: 




Usability:
For short
's or long-term predictions, do 2.
In either case (1 or 2), you don't publish the key/salt until you need to assert your proof. I'm don't think I'm mixing pre-image resistance and collisions :)
-
-
Is the file known?
-
No, that's the sorta the whole point of tweeting hashes :) You keep the input secret, but later on you want to be able to show you had it at along.
- 9 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.