How does the MD5 hashing work with the obfuscation of SmartConnector fields?
I plan to use field-based obfuscation on their custom Smart/FlexConnector to hash private data that should not be displayed. But I'm not comfortable with using this until I understand how the MD5 hashing itself works.
Does anyone have any information as to how the obfuscation works? Is it a straight MD5 translation, or is salt added to the hash? At which point does the data become hashed, from an architectural standpoint? Does the data become hashed before being sent out across the wire from the smartconnector to the destination (ESM/logger/etc)?
Would you consider this to be a secure method of obfuscating private data to create a unique identifier within ArcSight, yet keep the original data protected against reverse hashing?