Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's a teaser on the matter in the end.

You're right, generally the work revolves about writing the right hash function.

We'll see in the next article.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: