> Its an identical-prefix collision attack where you can pick your own allowed charset (say alphanum, base64, all printable). It also allows to force some specific bytes (mainly 0-7 and 20-27) to some extent.
I don't think the title is correct, this isn't "a new kind" of anything. This is the usual well-known attack on MD5 where you can create a pair of inputs with the same hash.
There's a followup tweet explaining it, which you wouldn't see if you're not logged in:
> This is the first md5 collision with only printable ascii that I know of.
I have been asked before if this was possible, but I used to respond its not practically doable.
Just had to verify it myself