SHA-256 may be very robust. It is not just like the incremental step from MD5
to SHA1. It could final a number of many years until there’s some huge
breakthrough assault.
If SHA-256 grew to become utterly damaged, I feel we may come to some
settlement about what the trustworthy block chain was earlier than the difficulty
began, lock that in and proceed from there with a brand new hash
perform.
If the hash breakdown got here regularly, we may transition to a brand new
hash in an orderly manner. The software program could be programmed to start out
utilizing a brand new hash after a sure block quantity. Everybody must
improve by that point. The software program may save the brand new hash of all of the
previous blocks to verify a special block with the identical previous hash cannot
be used.