Worth Reading: Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions Computing practitioners encounter hash functions almost every day, although they may not necessarily be the center of attention. When you install software packages or updates, the authenticity of a package is often verified with a cryptographic hash. Related ← Worth Reading: AI and the Destructive Lies of the Tool TropeWorth Reading: Scale AI, Outlier sued over mental toll of AI model safety →