As mentioned in this question, SHA1 has been obsoleted/cracked in early 2017.
Still, the checksums (e.g. qtcreator) used for the SDK downloads are SH1.
Doesn't this introduce a security risk, since the hashes could potentially be reproduced despite of having modified the packages?
| 2 | No.2 Revision |
As mentioned in this question, SHA1 has been obsoleted/cracked in early 2017.
Still, the checksums (e.g. qtcreator) used for the SDK downloads are SH1.
Doesn't this introduce a security risk, since the hashes could potentially be reproduced despite of having modified the packages?
| 3 | No.3 Revision |
As mentioned in this question, SHA1 has been obsoleted/cracked in early 2017.
Still, the checksums (e.g. qtcreator) used for the SDK downloads are SH1.
Doesn't this introduce a security risk, since the hashes could potentially be reproduced despite of having modified the packages?
| 4 | No.4 Revision |
As mentioned in this question, SHA1 has been obsoleted/cracked in early 2017.
Still, the checksums (e.g. qtcreator) used for the SDK downloads are SH1.
Doesn't this introduce a security risk, since the hashes could potentially be reproduced despite of having modified the packages?