True or False for following:
1. SHA-256 (with 256-bit output) is more resistant to attacks based on birthday paradox than SHA-1.
2. Key reuse is deadly for stream ciphers like RC4.
3. One of the benefits of Tor as opposed to basic onion routing is that sending messages over an established Tor circuit does not require any public-key operations.
4. To take advantage of the authentication and confidentiality services provided by