This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
a = /// | |
jfsld afjskld # jgidroj | |
fjalsk#{jf}djlk | |
/// | |
b= "jfkalsdj" | |
c= /jafkldsj/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### | |
Copyright(c) Zhenzhen Zhan | |
MIT License | |
Why use SHA-256? Is it OK to use CRC32? My answer is: | |
The reason is for security. There's a potential issue if we use a weak checksum algorithm. | |
If the tests include "get info from the web", then attackers may have the ability to affect the units' | |
true/false results that lead to the same checksum. | |
These are "user"-caused collisions, which need to be avoided logically. In contrast, |