How to reasonably hash a composite key into a UUID?
The Problem
In our system users are identified by a composite key. We’d like to devise a scheme to deterministically convert this composite key into a UUID.
Solutions?
The obvious first suggestion would be UUIDv5, however:
It’s based … Continue reading How to reasonably hash a composite key into a UUID?