In data storage and file methods, MD5 hashes are utilized for deduplication. This method requires storing only one duplicate of the file or block of knowledge, identified by its hash. While MD5 may still be employed in a few devices, safer hashing algorithms are proposed for critical systems.These vulnerabilities is usually exploited by attackers t