@OloEopia said in Naming things is hard: Actually yes, because if you know the hash algorithm you have a nice denial of service attack for anything that puts your user submitted data into a hashset. The better fix at the application level is not to let an entirely untrusted source specify enough keys for it to really matter.