Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They follow with:

"But, seriously: you can throw a dart at a wall to pick one of these... In practice, it mostly matters that you use a real secure password hash, and not as much which one you use.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: