Unfortunately, it could with MD5. The truth is, back in 2004, scientists managed to make two distinct inputs that gave a similar MD5 hash. This vulnerability could be exploited by bad actors to sneak in malicious knowledge. MD5 remains being used today for a hash operate Despite the fact that https://tysonlfztl.newbigblog.com/40473286/top-guidelines-of-what-is-md5-technology