cm0002@lemmy.world to Cybersecurity - Memes@lemmy.world · 20 days agoUh oh, somebody's not following best practices, that's a paddlinlemmy.worldexternal-linkmessage-square103fedilinkarrow-up1588arrow-down123
arrow-up1565arrow-down1external-linkUh oh, somebody's not following best practices, that's a paddlinlemmy.worldcm0002@lemmy.world to Cybersecurity - Memes@lemmy.world · 20 days agomessage-square103fedilink
minus-squarefrezik@midwest.sociallinkfedilinkarrow-up5·20 days agoThe strongly recommended hashing algorithms are slow on purpose, and often use up a lot of RAM, too. Multiplying the number of hashes you would need would multiply CPU/memory load for every new password.
The strongly recommended hashing algorithms are slow on purpose, and often use up a lot of RAM, too. Multiplying the number of hashes you would need would multiply CPU/memory load for every new password.