Skip to content
GitLab
Menu
Why GitLab
Pricing
Contact Sales
Explore
Why GitLab
Pricing
Contact Sales
Explore
Sign in
Get free trial
The hash of the unencrypted data should never be used to address the encrypted data
This allows an attacker to check whether data with a particular hash exists!