• 9 Posts
  • 313 Comments
Joined 1 year ago
cake
Cake day: October 6th, 2024

help-circle









  • Blorp dev here. I’m trying to decide what settings to support. Blorp is both PieFed and Lemmy, and supporting all features from both could get really complicated. So I’m starting simple and I’m going to add the features that get requested the most.

    Edit: also forgot to mention iOS will reject Blorp form the app store if it has a “NSFW” toggle, but there is no reason I can’t add that to Blorp when distributed outside the App Store.







  • I wonder how that works. The point of password hashing is to uniquely scramble your password. So userOneHash(“password”) should give a different output than userTwoHash(“password”) even if they use the same password. So your password manager shouldn’t really be able to generate the same password hash since an infinite number of hashes can be generated from the same password.




  • Mose13@lemmy.worldtoTechnology@lemmy.worldPlex got hacked.
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    9 days ago

    But if you use a salt that is global to your site/server, you still have this problem: If a hacker cracks “p@ssword” in your database, they immediately know all users that also use “p@ssword”. Imo the biggest benefit of using salts is two users with the same password get different hashes. Right?

    I’m not saying using a global salt isn’t better than no salt, but I do think you’re missing out on a huge benefit of using a per hash salt. Keep in mind I’m a frontend engineer not backend or security lol.


  • Mose13@lemmy.worldtoTechnology@lemmy.worldPlex got hacked.
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    9 days ago

    even if someone brute forces an offline copy of the hashes they wouldn’t result in actual useable passwords

    I thought you were suggesting that salted hashed passwords were uncrackable but maybe I misunderstood this

    Edit: I understand the offline pepper part now. My bad