Open Source
Deep Privacy 2
17-01-2023, 14:12
face hash
Checking data integrity with hyper-realistic human faces
Cryptographic hash functions are widely used to verify data integrity, but it is difficult for people to remember hexadecimal (or, even worse, binary) representations.
☝?However, humans have evolved to instantly analyze other human faces and store thousands of them in memory.
This makes faces an ideal representation of cryptographic hashes for quickly checking whether some data has changed, even after a long time.
17-01-2023, 14:12
17-01-2023, 14:15
17-01-2023, 15:59
There are no comments
Information
Users of Visitor are not allowed to comment this publication.