I wonder if it might help for different posters to use different hash functions, so if one person has targeted multiple people, their name can be triangulated on because it will very likely be the only one in common between the possible plaintexts of different posters’ hashes.
But there are other scenarios, such as a third party agent of chaos doing the cracking and starting the rumor mill. Stuff spreads way too quickly these days. Media will easily mis-explain hashes as "encryption" and carry on. And they won't even be too wrong in this use case.
-
-
But really my argument is that *the person using the hash needs to know all this stuff*. They need to be aware of what might happen, and how reversing the hash is possible and even easy. Not giving this information is dangerous and a disservice to the victims.
-
"Hey we should all start tweeting hashes of our attackers and search for them so we can find each other quietly" with no further explanation or discussion is just irresponsible advice. Things aren't that simple.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.