Skip to main content

Explore our questions

4votes
2answers
651views

Are truncated SHA-256 hashes safe enough when collisions are not a risk?

1vote
2answers
2kviews

Are passwords in Mozilla products stored insecurely?

2votes
0answers
49views

Why can't a Cognito user in the FORCE_CHANGE_PASSWORD state go through the forgot password flow?

15votes
2answers
17kviews

Estimating the size of a rainbow table

64votes
10answers
13kviews

Why does the user pick the password?

11votes
2answers
5kviews

Why aren't passwords also hashed on client side on desktop applications?

2votes
2answers
718views

What are the security features of the Microsoft PasswordVault class?

3votes
3answers
5kviews

Securely changing Veracrypt password

3votes
1answer
410views

Can I skip any password hashing for localhost authentication?

4votes
2answers
314views

Quantify security strength from entropy and lifetime

3votes
1answer
194views

SHA-256: thoughts and experiment

3votes
1answer
390views

What does the parallelism parameter in memory-hard password hashing algorithms adjust?

9votes
3answers
10kviews

Is a dictionary attack inherently faster than brute-forcing?

2votes
1answer
8kviews

How to recover lost zip file password?

Browse more Questions
close