A non-deterministic hash function wouldn't be terribly useful, would it? ;-)
Why not? I can think of at least one use for one.
In the old days the apprentice engineer was sent to fetch a bucketful of holes, more recently people were asked to design a device driver for the GSD, and today we could assign the task of producing an effective access control system using an indeterminate hash - the
trainee would have exactly the same chance of carrying out this task as anyone did with the traditional spoof tasks.