Can you clarify "an attacker can steal the original information if it is secret", this is not clear to me?
When we say: "use only hashing algorithms which are known to be strong" - I believe we should already list the ones that are not strong enough as of now and make it evolving over time.