About what is md5 technology
Sadly, it can with MD5. In fact, again in 2004, scientists managed to generate two diverse inputs that gave precisely the same MD5 hash. This vulnerability could be exploited by negative actors to sneak in malicious details.Now, let us proceed to employing MD5 in code. Be aware that for useful needs, it is suggested to work with more robust hashing