cyrtophora

Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README

commit 79ff93eb7018762eb9820ad04074315d71e57f61
parent 269634a225784fa8a6f563b6b93e260b9ffe3638
Author: Jackson G. Kaindume <seestem@merely.tech>
Date:   Thu, 18 Aug 2022 13:07:09 +0200

grammar

Diffstat:
Mdoc/password-hashing.md | 4++--
1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/doc/password-hashing.md b/doc/password-hashing.md @@ -19,8 +19,8 @@ users password with a [__hash function__](https://en.wikipedia.org/wiki/Hash_fun There are lots of hash functions that can be used, but most of these will be a bad idea to use. For example if you use SHA-256 or other -computationally cheap (hash function without a __work factor__ -parameter) functions, they are vulnerable to rainbow table attacks. +computationally cheap functions (hash function without a __work factor__ +parameter), they are vulnerable to rainbow table attacks. Bruteforce is also possible if the password length is short/known, asic miners can generate 100 TeraHashes PER Second.