Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Only if the server only keeps around the hash -- which is why I said there are trade-offs to be made. The point I was making was that the mere fact that you're sending a hash does not trigger the "hash-becomes-password" issue; that's a result of secondary constraints imposed on the problem.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: