by broken, you mean collision ? It only affects it as a content
hash(theoretically), say for source distribution(even that is remote as
the altered content may become meaningless, failed to compile etc.) but
in general safe for this kind of password usage, if my reading about
the paper is right.

Reply via email to