This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: GOplX98bIb2cwGzsVihosos4_N0dBft_5ltAdDx_Kow
Cover

Hashing Passwords In Python: Bcrypt Tutorial with Examples

Written by @wagslane | Published on 2020/1/30

TL;DR
Not understanding the security implications of password storage can lead to devastating breaches and leaks. If you are building an application and need to store user credentials, learn about hash functions. A hash function (or more specifically in our case, a key derivation function) deterministically creates a strong key from a password. Because hashes are one-way, the attacker can’t re-create the plaintext password from the hash. Because a majority of people reuse passwords on different websites, they can hack other systems. Luckily Bcrypt handles salting automatically.

[story continues]


Written by
@wagslane
Founder of Boot.dev. Whining about coding sins since 2011. Committing coding sins for the same.

Topics and
tags
python|cryptography|programming|hashing|security|bcrypt|password-security|pasword-protection
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: GOplX98bIb2cwGzsVihosos4_N0dBft_5ltAdDx_Kow