[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: IMG_2921.png (9 KB, 840x840)
9 KB
9 KB PNG
Do modern hashing algorithms render him a useless cuck boy?
>>
?????
sha2 is old
nobody uses sha3
there's no such thing as a modern hashing algorithm
only outdated ones
>>
literally who? buy an ad
>>
>>100200155
Based retard

>>100200136
Bcrypt, argon2, scrypt etc. Don’t get hung up on the word modern.
>>
>>100200075
>Do modern hashing algorithms render him a useless cuck boy?
no, how would they?
>>
>>100200075
No because you can always crack hashes if the passwords are weak by using a lookup table
Just hash all of the weak passwords until you find a match.
Then, you know that that email used that password.
You could avoid this by salting the hashes but that can be broken too with enough work
>>
oh he's fucking talking about john the ripper
john the ripper wasn't a fucking upper class dandy christ what a horrible logo



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.