logoalt Hacker News

dgshsgyesterday at 7:56 PM1 replyview on HN

We'll have to deal with it forever in network protocols. Thankfully that's rather walled off from most software.


Replies

newpavlovyesterday at 8:08 PM

As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons.

show 1 reply