Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
alright2565
10 days ago
|
parent
|
context
|
favorite
| on:
I found a vulnerability. they found a lawyer
What hash algorithm was required?
help
tracker1
7 days ago
[–]
pbkdf2 with at least 10k iterations, at least 32bytes (I went with 100k, 64 bytes as base64).
reply
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: