During our IRC conversation, someone pointed possibility of leaking user e-mails by using them as keys (it was @thejh probably, he's a sneaky bastard).
Now we hash those keys using the same hash function we use for passwords and some salt (salt in config is obviously just a sample one).
During our IRC conversation, someone pointed possibility of leaking user e-mails by using them as keys (it was @thejh probably, he's a sneaky bastard). Now we hash those keys using the same hash function we use for passwords and some salt (salt in config is obviously just a sample one).