|
You are here |
palant.info | ||
| | | | |
qsantos.fr
|
|
| | | | | [AI summary] The article discusses the security implications of client-side password hashing, arguing that it can be secure when combined with memory-hard functions and proper implementation. | |
| | | | |
truss.works
|
|
| | | | | At this point, if you haven't had a password leaked as part of a hack, you probably know someone who has. Here are some key lessons on how to better protect yourself and your data. | |
| | | | |
randomnixfix.wordpress.com
|
|
| | | | | I want to focus on something more broad than the *NIX scope in this post, because it has been a big thing to me. In a day and age where there are multiple database breaches each year, and millions of passwords leaked to the Internet, your passwords could either be potentially stolen themselves or your... | |
| | | | |
tashian.com
|
|
| | | The story of a major hash table vulnerability, and how it took a decade to uncover and resolve. | ||