Information deduplication. MD5 can be used to recognize duplicate data files by making a hash for every file and comparing the hashes. If two data files make exactly the same hash, they are very likely identical, letting for successful information deduplication. Collision vulnerability. MD5 is prone to collision attacks, in https://johnathanflors.thenerdsblog.com/39310492/5-tips-about-what-is-md5-technology-you-can-use-today