-
Hello,
Thanks for Dashy this is a very nice looking project. But
Hashing passwords with SHA256 alone is not sufficient for secure password storage. Here's why:
1. Speed: SHA256 is designed to be fa…
-
Have an idea for a new feature? Please fill out the sections below. 😊
### Current Behaviour
The current finance tracker stores passwords using encryption, but for sensitive financial data, adopt…
-
[OWASP password hashing algorithms](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#password-hashing-algorithms)
-
Following up from https://github.com/RustCrypto/meta/issues/10, this is an issue for discussion potentially adding "recommended" badges to certain algorithms in this repo:
![Recommended: Yes](https…
-
The first hashing algorithm I introduced was PBKDF2. This is a good accepted standard. But nowadays there are others that may be better.
[Argon2](https://cryptobook.nakov.com/mac-and-key-derivation…
-
Storing passwords in databases #7 should not be done in cleartext, but carbon doesn't provide any hashing algorithms at the moment, for example sha256 and sha512.
Some other cryptographic algorithms t…
-
So the recent Okta username-longer-than-52 security advisory got me interested in best practice for handling longer-than-72 password length with bcrypt.
Someone in X/Twitter suggests we can SHA256 h…
-
Related to #1, it would be nice if we support different hashing algorithms, including no hash (plain text) via some optional parameters. (`flag`)
-
**Description:**
Right now, when we want to handle passwords in a Ballerina service, there's no inbuilt option that uses salt/pepper. Hashing passwords using a pure hash function (like SHA512, SHA 25…
IMS94 updated
1 month ago
-
Currently by default, RabbitMQ only supports sha256 and sha512 for password hashing. These two hasing algorithms are considered having security risks nowadays. The pbkdf2 algorithm is considered more …