Powerful GPG collision attack spells the end for SHA-1

New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services.

This post appeared first on Naked Security Blog by Sophos
Author: Danny Bradbury