5 Jan
2012
5 Jan
'12
5:32 p.m.
On 01/04/12 21:06, Patrick Domack wrote:
But still, the results are all the same, if they get the hash, it can be broken, given time. Using more cpu expensive methods make it take longer (like adding salt, more complex hash). But the end result is they will have it if they want it.
Unless someone breaks either math or the hash algorithm, this is false. My password will be of little use to you in 10^20 years.