by Zooko Wilcox, Zcash and LeastAuthority, 2017-02-24
This document is a work-in-progress. Please contact the author if you see errors or omissions.
Go to https://z.cash/technology/history-of-hash-function-attacks.html and hit reload until the new version of this document appears.