Deprecated Algorithms: Why Using MD5 and SHA-1 Still Gets You Breached