• paul.knibbs (1/24/2012)


    A non-deterministic hash function wouldn't be terribly useful, would it? 😉

    Why not? I can think of at least one use for one.

    In the old days the apprentice engineer was sent to fetch a bucketful of holes, more recently people were asked to design a device driver for the GSD, and today we could assign the task of producing an effective access control system using an indeterminate hash - the victimtrainee would have exactly the same chance of carrying out this task as anyone did with the traditional spoof tasks.

    Tom