this post was submitted on 05 Sep 2024
66 points (91.2% liked)
Apple
17525 readers
35 users here now
Welcome
to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!
Rules:
- No NSFW Content
- No Hate Speech or Personal Attacks
- No Ads / Spamming
Self promotion is only allowed in the pinned monthly thread
Communities of Interest:
Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple
Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode
Community banner courtesy of u/Antsomnia.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
@TwilightKiddy I can see how you can get there, but the MITM would need to know the hashing algo, you can’t *really* just un-hash something, at least not reliably
But your original statement was that the hashing was the privacy violation, and that’s the part I took issue with, hashing is a generally accepted security measure, it is not inherently a privacy violation
I meant a pretty well-known case, not hashing in general. Thought that was obvious.