[DESCRIPTION]
.\" Add any additional description here
[BUGS]
-The MD5 algorithm should not be used any more for security related purposes.
-Instead, better use an SHA\-2 algorithm, implemented in the programs
+Do not use the MD5 algorithm for security related purposes.
+Instead, use an SHA\-2 algorithm, implemented in the programs
sha224sum(1), sha256sum(1), sha384sum(1), sha512sum(1),
or the BLAKE2 algorithm, implemented in b2sum(1)
[DESCRIPTION]
.\" Add any additional description here
[BUGS]
-The SHA-1 algorithm should not be used any more for security related purposes.
-Instead, better use an SHA\-2 algorithm, implemented in the programs
+Do not use the SHA-1 algorithm for security related purposes.
+Instead, use an SHA\-2 algorithm, implemented in the programs
sha224sum(1), sha256sum(1), sha384sum(1), sha512sum(1),
or the BLAKE2 algorithm, implemented in b2sum(1)