SHA-1 Shattering Code Repos

Download this episode

Download Video


Git and Svn both use SHA-1 for identifying submissions to source code repositories. But SHA-1 was shattered. So now what?



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image

      Hi - just a couple of thoughts - SHA-1 only provides integrity (so no authentication or non-rep) - its the 'higher order' functions that utilise primitives such as SHA-1 for authentication or non-rep that present the concern : )

      Second thought - are you sure you're not endangering other road-users : )

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.