TL;DR —
Not understanding the security implications of password storage can lead to devastating breaches and leaks. If you are building an application and need to store user credentials, learn about hash functions. A hash function (or more specifically in our case, a key derivation function) deterministically creates a strong key from a password. Because hashes are one-way, the attacker can’t re-create the plaintext password from the hash. Because a majority of people reuse passwords on different websites, they can hack other systems. Luckily Bcrypt handles salting automatically.
[story continues]
Written by
@wagslane
Founder of Boot.dev.
Whining about coding sins since 2011. Committing coding sins for the same.
Topics and
tags
tags
python|cryptography|programming|hashing|security|bcrypt|password-security|pasword-protection
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: GOplX98bIb2cwGzsVihosos4_N0dBft_5ltAdDx_Kow
