> 1. What hash algorithm to use?

> 2. Should I add support for trusting hash uniqueness

Use two hash functions and concatenate the hashes.  While both hash systems may 
eventually be hacked it is unlikely that hacking them will result in a targeted 
alias.

Reply via email to