benjamin has quit [*.net *.split]
benjamin has joined #pypy
graingert[m] has quit [*.net *.split]
commandoline_ has quit [*.net *.split]
ctismer has quit [*.net *.split]
habnabit_ has quit [*.net *.split]
ammar2 has quit [*.net *.split]
ctismer has joined #pypy
commandoline has joined #pypy
commandoline has joined #pypy
commandoline has quit [Changing host]
habnabit_ has joined #pypy
ammar2 has joined #pypy
graingert[m] has joined #pypy
glyph has quit [Quit: End of line.]
glyph has joined #pypy
greedom has joined #pypy
<
nimaje>
shouldn't xoring ints with each dict getting some other random number to xor with be good enought in most cases?
<
cfbolz>
nimaje: my biggest problem in this (security) space is that ultimately I have no real clue about it
<
arigato>
nimaje: I think no: the attacks are about getting the exact same hash on many keys
<
arigato>
so you can xor them if you like, they are still the same hash
lritter has joined #pypy
slav0nic has joined #pypy
lritter has quit [Quit: Leaving]
greedom has quit [Remote host closed the connection]
slav0nic has quit [Ping timeout: 260 seconds]