A hashing algorithm is a fast,one-way function that lets you take a piece of data and convert it to something else (called the hash). Thus, you can compare hashes of two strings to make sure that the original strings are the same. A hash collision occurs when two strings have the same hash, and a collision attack is one where given a hash, you try to come up with a string that has the same hash (thereby violating the one way property of the hashing algorithm)
SHA-1 is a hashing algorithm from early 90s that, over the past decade or so, is no longer considered secure against well-funded opponents.
Today, CWI Amsterdam and Google announced a practical collision attack against SHA-1, publishing two dissimilar PDF files which produce the same SHA-1 hash as proof of concept.
Partner, Head of User Acquisition at Social Capital
This Q&A Session has now ended but
Andy may still answer new questions
Hi everyone! I'm Andy and I'm an investor at Social Capital based in Palo Alto, CA. Social Capital is a partnership of philanthropists, technologists and capitalists utilizing venture capital as a force to create value and change on a global scale.
Previously, I ran finance and built out the analytics for OMGPOP, a VC backed social gaming startup. We sold the company to Zynga in March 2012 for $180M.
Before OMGPOP, I began my career with IBM's M&A team buying software companies ranging from $20M - $10B+ valuations. I'm passionate about startups, especially ones focused on health and data.
Ask me anything!
Moderator note: We are very excited to have Andy do this Q&A Session for us here! You can follow Andy on Twitter (@artzandy) and ask him about Mergers & Acquisitions, Financial Modeling, Due Diligence, Financial Management, Budgeting, Venture Fundraising, Data Mining, mySQL and Web Analytics.
A huge contributor to Apple's high retention amongst iPhone users is attributable to iOS — for most of the world it is unimaginable for an iPhone user to upgrade to anything but another iPhone: there is too much of the user experience, too many of the apps, and, in some countries like the U.S., too many contacts on iMessage to even countenance another phone.
Unlike the rest of the world, in China the most important layer of the smartphone stack is not the phone’s operating system. Rather, it is WeChat, making iOS irrelevant for the Chinese. WeChat is your phone — and it works the same on iOS or Android.
Read the full article for a deeper analysis around this interesting observation.
Google’s life sciences unit, Verily, is releasing 20 million bacteria-infected mosquitoes in Fresno
Verily’s male mosquitoes were infected with the Wolbachia bacteria, which is harmless to humans, but when they mate with and infect their female counterparts, it makes their eggs unable to produce offspring.
Male mosquitoes don’t bite, so Fresno residents won’t have to worry about itching more than they usually would.
It hopes to wipe out this potential Zika-carrying mosquito population to prevent further infections.
Bonus fact: The project is called Project Debug — which is a very very clever name :)