Explore >> Select a destination


You are here

blog.perryizgr8.com
| | pagefault.se
2.5 parsecs away

Travel
| | I've been planning on writing a longer series of post about hash functions to learn more about how they work and what goes into designing good hash functions. During my research I stumbled upon something called Locality Sensitive Hashing. If you've used a hash function before or know something about them, you probably know that changing the input to a hash function by just a little bit produces a wildly different result.
| | kevquirk.com
9.0 parsecs away

Travel
| | Ever wondered how websites check your password? I mean, how can they check your password without being able to read it? It's a catch 22, surely?
| | mathspp.com
7.2 parsecs away

Travel
| | Today I learned that the hash of an integer is the integer itself, except for -21. The hash of -1 is -2.
| | bitslog.com
51.5 parsecs away

Travel
| This document describes a weakness in Bitcoin Design that reduces the security of SPV proofs and therefore SPV Wallets. The weakness was discovered by me on August 2017, but during the responsable disclosure process I learnt it was previously known by some prominent members of the Bitcoin Core team. Using this weakness an attacker can...