Somewhat paranoid.

There was some discussion about possible attack vectors for checksum-only deduplication. However i don’t think the proposed vectors are really feasible. The first attack tries to create data corruption by foiling deduplication into using a thoughtfully created block, with the same checksum but different data. Another, less discussed attack vector, is gaining knowledge of a block by using a thoughtfully created block to foil dedup to show you a different block than the one you have actually written, as the checksum-only variant didn’t stored your block, but just created a pointer to data written beforehand. Yes, it’s thinkable that you can cancel out a write by creating a packet with the same checksum to create data corruption. But when the possibility of an accidental collision is already that low, how would you quantify the possibility of: