And then some script kiddie from 4chan with a GPU outs all the plaintexts, and/or sets up a Twitter bot to automate it. Be very, very careful with ad-hoc security "protocols" like this. Especially when your livelihood may be at stake.https://twitter.com/Dharlette/status/944183293653733376 …
Pro tip: if A posts a hash of B's name and C cracks it, C isn't going to get the blame and media attention for incriminating B. A is.
-
-
Not the case in most anglosaxon legal systems AFAIK.
-
Got any citation for that? Case law or legal analyses on how encryption or hashing interacts with libel laws? That would be a fun read.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.