Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To beat the dead horse one more time, please use per-user salts and bcrypt, scrypt, or PBKDF2 (RFC 2898).

Single time hashes (even per-user salted), are no longer sufficient protection.



I think you mean "PBKDF2 with thousands or tens of thousands of iterations," not single iteration like RIM was using :) http://blog.crackpassword.com/2010/09/smartphone-forensics-c...




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: