Over time, as MD5 was getting prevalent use but proving to get vulnerable, the MD6 hashing algorithm emerged. But MD6 went rather unused and faded into obscurity, Possibly due to uncertainties people had about MD5. Collision vulnerability. MD5 is vulnerable to collision attacks, where two unique inputs produce the exact https://cristianimrvy.tinyblogging.com/the-fact-about-what-is-md5-technology-that-no-one-is-suggesting-77695765