“Can” is *extremely* relative. It’s technically possible to invert a hash given given sufficient resources, but it’s definitely *not* the same as posting plaintext. There’s also some plausible deniability in that usually there are collisions.
-
-
I wonder if it might help for different posters to use different hash functions, so if one person has targeted multiple people, their name can be triangulated on because it will very likely be the only one in common between the possible plaintexts of different posters’ hashes.
2 replies 0 retweets 0 likes -
If you wanted to make being targeted by some bizarre countermovement harder, you could post a salt with your hash, but that makes it SO much harder to use it to find others victimized by the same person that it mostly defeats the purpose.
1 reply 0 retweets 1 like -
Replying to @Dharlette @kechpaja
If your goal is to be able to search Twitter for other victims with plausible deniability, then as I said a viable approach is to *deliberately* weaken the hash to ensure collisions. As for countermovements, "bizarre" is exactly what 4chan excels at.
1 reply 0 retweets 5 likes -
Again, these are things you have to *consider* and analyze and model. You need to understand the risks. You need to *explain* those risks. You need to try to come up with the best possible solution. Not doing so is dangerous and a disservice to victims.
1 reply 0 retweets 2 likes -
Yo, I thought you said you were done Sealioning.
1 reply 0 retweets 0 likes -
Thanks for using that term, I had forgotten what it meant. I think I kinda get it after reading a bunch of comments. Basically, even if someone did find the name associated with the hash, and made it public, they'd be doing so at their own risk and publicizing it themselves?
2 replies 0 retweets 1 like -
Replying to @jnesselr
Which I find to be a silly notion. The burden would still fall on the person making the accusation (hashed or not), not the person who merely deobfuscated it. If I randomly cracked a hash, who would you think the attacker and media would go after, me or the person who posted it?
1 reply 0 retweets 1 like -
Replying to @marcan42
Yeah, it's kind of a weird social theory thing. Basically, it makes an attacker or ally of an attacker less likely to discredit someone. If the media cracked the hash, then publicized it they would be the ones publicizing it and "making a big deal out of it".
1 reply 0 retweets 0 likes -
If an attacker did desire to discredit them, they probably could do it in ways that wouldn't reveal themselves, sure, but your goal is to stop the allegations and yelling voices as an attacker. If a media outlet is reporting on it, they're going to want a bit more than a hash.
2 replies 0 retweets 0 likes
As an attacker, if you have multiple victims, and you see this going on, it absolutely would make sense to reveal it before they can become organized via this scheme. Get them before they get together.
-
-
But there are other scenarios, such as a third party agent of chaos doing the cracking and starting the rumor mill. Stuff spreads way too quickly these days. Media will easily mis-explain hashes as "encryption" and carry on. And they won't even be too wrong in this use case.
1 reply 0 retweets 0 likes -
But really my argument is that *the person using the hash needs to know all this stuff*. They need to be aware of what might happen, and how reversing the hash is possible and even easy. Not giving this information is dangerous and a disservice to the victims.
1 reply 0 retweets 1 like - Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.