Hashing – Protecting Integrity
Hashing isn’t about hiding messages — it’s about checking if they changed.
A hash turns data into a unique fingerprint (like SHA-256).
If even one letter changes, the fingerprint looks completely different — that’s how you detect tampering.