Researchers have produced a collision in iOS’s built-in hash function, raising new concerns about Apple’s CSAM-scanning system — but Apple says the finding does not threaten the integrity of the ...
Compare SHA-256 vs Keccak-256 cryptographic hash functions, security, performance, and blockchain applications.
1) It is trivial for someone to cause a collision (in fact effectively indefinitely many) with other inputs they control. 2) It's almost certainly not too hard for someone motivated to generate ...