tag:blogger.com,1999:blog-4384692836709903146.post8734712533031556293..comments2024-03-27T09:55:23.143-07:00Comments on Dispatch from the Digital Health Frontier: Metadata in an HIEJohn Halamkahttp://www.blogger.com/profile/04550236129132159307noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4384692836709903146.post-51480402728907841302012-05-10T09:27:50.109-07:002012-05-10T09:27:50.109-07:00We agreed to use Salted SHA-2, but I left that out...We agreed to use Salted SHA-2, but I left that out of my original post. I've added the detailsJohn Halamkahttps://www.blogger.com/profile/04550236129132159307noreply@blogger.comtag:blogger.com,1999:blog-4384692836709903146.post-18892788392189762762012-05-10T08:04:59.098-07:002012-05-10T08:04:59.098-07:00The hashing method you discuss does obscure, but d...The hashing method you discuss does obscure, but doesn't secure. Unless there is a secret salt, all you have done is obscure the identifiers. Ultimately the audit log must be managed, including securing it.John Moehrkehttps://www.blogger.com/profile/04526719420117446030noreply@blogger.comtag:blogger.com,1999:blog-4384692836709903146.post-47192804881896445972012-05-09T19:19:44.976-07:002012-05-09T19:19:44.976-07:00Terrific summary and advance of the discussion we ...Terrific summary and advance of the discussion we had during our Provider Engagement WG last week. I'm glad we came to the same conclusion and for the same reasons, at least at a high level. As always, you provide the slick tech think. Thanks John.<br /><br />-NeilNeil Kudlernoreply@blogger.com