> 1. What hash algorithm to use? > 2. Should I add support for trusting hash uniqueness Use two hash functions and concatenate the hashes. While both hash systems may eventually be hacked it is unlikely that hacking them will result in a targeted alias.