Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Good point. I do the same in my own system and use Hashes of the source code, so there are no collisions. Slowly this technique will become mainstream I predict.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: