Women posting hashes of their abusers names is a brilliant way of finding others until you have critical mass to come forward. It's the kind of thing cyberpunk stories about crypto would have contained had the genre not been defined by men.https://twitter.com/sarahjeong/status/943941331583299585 …
-
Show this thread
-
A great many men have been up in my mentions pointing out that men can easily search a hash of their OWN names to identify women who are posting. Guys. Bros. Dudes. Abusers are ALREADY aware of the people they've targeted.
3 replies 21 retweets 171 likesShow this thread -
And for the "but Rainbow tables!" crowd... What if I told you that the goal of women posting hashes of their abusers names actually has nothing to do with protecting men? It's about not having to be the first one to speak out.
11 replies 12 retweets 144 likesShow this thread -
Replying to @Dharlette
You still don't get it. I know that's the goal. It doesn't matter what your goal is. If the hashes are reversible, *whatever your goal is* in using hashes can be subverted. You might as well just post plaintexts.
1 reply 0 retweets 9 likes -
Replying to @marcan42 @Dharlette
“Can” is *extremely* relative. It’s technically possible to invert a hash given given sufficient resources, but it’s definitely *not* the same as posting plaintext. There’s also some plausible deniability in that usually there are collisions.
4 replies 0 retweets 3 likes
Hector Martin Retweeted Hector Martin
My point is that you *need* to be aware of exactly what the risks are. There are no collisions by default (for deniability purposes); I already mentioned *deliberately* engineering collisions for this purpose, but it needs to be explicit.https://twitter.com/marcan42/status/944586669143023617 …
Hector Martin added,
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.