Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Mostly, there will be a column conveniently labeled 'salt'. And in e.g. a MySQL database, you can bet the native hashing format has been used.

Ignoring that, if someone got your database, you should assume they got your code. If you care about passwords not being lost, you use bcrypt or something similar.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: