On Mon, Jan 31, 2011 at 08:37:00PM +0100, Karsten Loesing wrote: > Here's a sample bridge pool assignment from September 2010 that is > sanitized as described above (all IP addresses set to 127.0.0.1, contained > fingerprints are SHA-1 hashes of the original fingerprints): > > http://freehaven.net/~karsten/volatile/bridge-pool-assignment-sample > > This sample is there, so that everyone gets a better idea of what is meant > by a bridge pool assignment. Does anyone object to publishing tarballs of > these sanitized bridge pool assignments on the metrics website, so that we > (and anyone else) can analyze them?
Is there enough entropy in the things you're hashing to prevent reversing the hash? - Ian
