Design a duplicate-file removal algorithm | Abnormal Security