SHA1
The SHA1 algorithm is insecure and cannot be used.
Almost all platforms will offer the SHA2 hashing algorithm as secure alternative.
It has been analysed for many years, and cryptographers have broken enough of the algorithm to break the security guarantees that it was supposed to give.
Not every type of SHA1 usage is insecure
If analysed in more detail, some use cases could still be secure while using the SHA1 algorith. However, as described in our
philosophy we prioritise a simple and controlable security policy above a perfectly acurate security standpoint. In this method, all uses of the SHA1 algorithm are considered insecure.