Broken SHA hashes and cryptocurrency

https://arstechnica.com/information-technology/2020/01/pgp-keys-software-security-and-much-more-threatened-by-new-sha1-exploit/ https://www.schneier.com/blog/archives/2020/01/new_sha-1_attac.html https://www.tomshardware.com/news/researchers-reveal-new-sha-1-attack https://en.bitcoin.it/wiki/SHA-256 The SHA hash used in Bitcoin is iterated, or re-applied to its output. When a hash function is iterated for a second time in this manner, the size of its range is reduced by an approximate factor of by random collisions. The iterated hash function itself can also be iterated, and […]