Jax used his keyboard to write :
> Mike Duffy wrote in
> news:m4e93f$oeu$1@dont-email.me:
>
>> On Tue, 18 Nov 2014 01:39:16 +0000 (UTC), Dustin wrote:
>>
>>> I suspect that's exactly how things will go down in the event
>>> both of us are able to create the md5 hash (oh, my bad, your
>>> checksum)
>>
>> Sadly, I agree. And thanks for pointing out that there is a
>> difference between "hash" and "checksum". I always thought that
>> the two terms were synonymous and needed to look up the (subtle)
>> difference. Although, as you say, the MD5 algorithm serves as both
>> in my case, this is more because of the manner I want to use it
>> than the nature of the algorithm itself.
>
> Mike that was an interesting reply you got from Dustin. Your plan
> has too many holes for me to be interested.
It seems like a lot of extra work just to get back to where we are now.
> Dustin too it seems.
If the same result can be had for less work expended then why not do it
the easy way.
> I don't know much about MD5......
Same as above.
> and nor do you the difference
> between us is I know my limits and that's why I don't talk about
> MD5. Maybe you should do the same. Just saying!
It doesn't seem to stop you from accusing ASIC of mishandling integers.
--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
|