The Fabulous Linked List - Big Machine

added by DotNetKicks
6/27/2022 2:44:32 PM

202 Views

I've written a few authentication routines in my career and I've made sure to always hash sensitive user information. The thing is: I usually Googled which hashing algorithm to use and asked friends' advice. Turns out there's more than just bcrypt... and now I know when and why to choose something different.


0 comments