Skip to main content

Disable insecure hashes

Overview

About this category

This category contains privacy scripts for Windows.

These changes use Windows system commands to update your settings.

This category includes scripts to disable insecure hash algorithms during cryptographic operations.

Hash algorithms are essential for internet security, electronic banking, and document signing. Insecure hashes, however, are susceptible to collision attacks 1 2. This vulnerability enables attackers to spoof content, perform phishing, or execute man-in-the-middle attacks 3 4. Consequently, an attacker could intercept or modify data transmitted over what is believed to be a secure connection, without being detected. For instance, attackers could exploit this to divert your payments to their accounts, creating significant risks.

Caution

This may cause compatibility issues with older devices or software.

Use with Caution

This category is only recommended if you understand its implications. Some non-critical or features may no longer function correctly after running this script.

Apply now

These scripts are written using Batch (batchfile) scripting language.

Choose one of two ways to apply:

  1. Automatically via privacy.sexy: The easiest and safest option.
  2. Manually by downloading: Requires downloading a file.

Alternative 1. Apply with Privacy.sexy

privacy.sexy is free and open-source application that lets securely apply this action easily.

Open privacy.sexy

It allows selectively choose parts of this action to conduct. You can fully restore this action (revert back to the original behavior) using the application.

privacy.sexy instructions
  1. Open or download the desktop application
  2. Search for the category name: Disable insecure hashes.
  3. Check the category by clicking on the checkbox of the category.
  4. Click on Run button at the bottom of the page.

Alternative 2. Download

Consider restarting your computer for all changes to take affect.

Reversible

This action is completely reversible, you can restore your changes to the initial/default state. The restore/revert methods provided here can help you fix issues.

If something goes wrong, use the Revert script provided above.

Strict

This script includes Standard and Strict recommendation levels.

Use with Caution

This script is only recommended if you understand their implications of every single change. Some non-critical or features may no longer function correctly after running this script.

Download Strict scripts:

Download script

Restore these changes if you decide to revert them by downloading the restore script:

Download restore script

Explore further

This category includes total of 2 scripts but no subcategories.

Explore its 2 scripts:

Disable insecure "MD5" hash

This script disables the use of the "MD5" hash algorithm during the SSL/TLS handshake process. This script only affects the SSL/TLS handshake process. The SSL/TLS handshake is a key part of establishing a secure connection over the internet. By disabling this weak algorithm, the script improves the security of the connection. This algorithm is vulnerable to collision attacks. This vulnerability enables attackers to spoof content, perform phishing, or execute man-in-the-middle attacks. Conseq...

Disable insecure "SHA-1" hash

This script disables "SHA" hash algorithm, also known as Secure Hash Algorithm (SHA-1). This script only affects the SSL/TLS handshake process. The SSL/TLS handshake is a key part of establishing a secure connection over the internet. By disabling this weak algorithm, the script improves the security of the connection. This algorithm is vulnerable to collision attacks. This vulnerability enables attackers to spoof content, perform phishing, or execute man-in-the-middle attacks. Consequentl...

Explore Categories

This action belongs to Disable insecure connections category. This category includes scripts designed to enhance users' security and privacy by disabling outdated or vulnerable connections across the system. It safeguards data against interception, unauthorized access, and attacks that exploit outdated technology vulnerabilities, including... Read more on category page ▶

Support

This website relies on your support.

Support now

Your donation helps keep the project alive and improves its content ❤️.

Share this page: