Lifetimes of Cryptographic Hash Functions | Dark Hacker News