Closed K1-R1 closed 1 year ago
Arbitrary bytes in hash functions can be removed; they served to add additional entropy however this is not necessary as knowing the hash does not create a vulnerability, the hash must still be signed over by a multisig user.
Arbitrary bytes in hash functions can be removed; they served to add additional entropy however this is not necessary as knowing the hash does not create a vulnerability, the hash must still be signed over by a multisig user.