Unfortunately, it could possibly with MD5. In actual fact, back in 2004, researchers managed to create two different inputs that gave the same MD5 hash. This vulnerability may be exploited by poor actors to sneak in malicious details. It had been developed by Ronald Rivest in 1991 which is primarily https://andersonokcvp.onesmablog.com/everything-about-what-is-md5-technology-74101124