And then some script kiddie from 4chan with a GPU outs all the plaintexts, and/or sets up a Twitter bot to automate it. Be very, very careful with ad-hoc security "protocols" like this. Especially when your livelihood may be at stake.https://twitter.com/Dharlette/status/944183293653733376 …
-
-
none of which helps if someone knows you and your likely abusers
-
Exactly.
End of conversation
New conversation -
-
-
Real abusers will search for their hashes (no tech skills required). So posting hases non-anonymously poses risk!!!1 Such hashes can be widely abused (against names of all genders). Anyway the last stage will be report to police (so trusting police is still required).
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Keeping there names a secret is not the point. Its against it actually. It just about getting some time to find others, without dropping a plaintext Google spreadsheet.
-
I know. And I'm saying that won't work after someone writes a Twitter bot to reverse the hashes in seconds for the lulz, turning the approach into the equivalent of a plaintext Google spreadsheet.
- Show replies
New conversation -
-
-
If a weak hash is used, can't you easily filter out collisions that don't look like a real name with a few heuristics?
-
You set up the hash so that you get collisions with *real names*. For example, for a target population of 1,000,000 names, you'd perhaps want a 16-bit hash that would yield ~16 expected collisions per hash.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.