On Jun 27, 2009, at 1:40 AM, Simon Michael wrote:

Thanks, I see. At least with reg and print; ledger bal --anon gives me no output.

--anon is only meant to be used with "print". The idea is that you capture the resulting output to a file, and then run "bal" on that file.

Is that kind of hash hard to reverse-engineer ? If I published the -- anon version of my company's ledger, how hard would it be for a motivated person to decode the names ?

You mean, find the string that the hash came from? You'll have to talk to somebody who's up on crypotography to answer that!

I am wondering about picking random human-readable names, instead. Ie each time you run --anon, create a new mapping from original names to random names, and translate everything.

That's quite possible too. You would use the SHA1 like a hash then, to index a static table of precanned names?

John

Reply via email to