Keep It Simple


In my opinion, simple designs are harder to get right than complicated ones. Still, I felt that my first web app needed to be minimal in order to not take away from the Identicons presented there. Here’s what I did.

Continue reading “Keep It Simple”


My First Web App

The holidays are here! This means that there is finally enough time to develop my first web app. Knowing how bad I still am at debugging weird errors and how little experience I have with frameworks, I prepared myself for a nerve-racking experience full of apparently insurmountable obstacles.

First of all, I researched a few popular python frameworks, services and tools to find the best options for me. Since I prefer lightweight and modern frameworks, Flask was an obvious choice. Flask also supports Jinja2 Templating out of the box, which is great. For deployment, I picked Heroku because it seems to be quite beginner friendly.

Continue reading “My First Web App”

Unique != Distinguishable

Had you asked me a week ago, “What’s the most difficult part about generating identicons?”, I would have answered, “Making them look good, obviously.”
Turns out I was wrong. It’s actually quite easy to configure an image generator to produce beautiful images: Take care your colors don’t clash and you should be fine.

The problem lies somewhere else. It’s obvious and easy to overlook at the same time: Images need to be complicated enough to make them unique. At the same time, complexity makes them harder to distinguish. Sadly, this only occurred to me when my image generator was fully implemented and I tested it with some strings.

Continue reading “Unique != Distinguishable”

SHA-1 Is Dead, but Not Quite Yet

Even though SHA-1 has been considered deprecated for many years now, it is still widely used. About a month ago, it was broken in practice, rendering it useless as a cryptographic hash function. At this point, most people will probably stop using it for security related purposes. An insecure “secure hash algorithm” is basically useless, isn’t it?

Well, I don’t think so. Obviously, it’s a very bad idea to rely on SHA-1 for security. However, the algorithm still converts input into a short binary or hex string of fixed length, which might be useful for some fun projects. You could map pretty much anything to a SHA-1 hash: color values, coordinates, musical notes, words,… – you get the idea.

Actually, that sounds like a great idea for a mini project: I will generate (almost) unique identicons with SHA-1 hashes. More stuff to blog about, yay!