Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

20
  • 25
    "Password hashing is bad because it makes you think it's okay for users to send you their passwords." Whuh? Says who? Based on what research? Commented Jul 7, 2023 at 2:41
  • 46
    Now there's a game of "pass the buck" if I've ever seen one. Commented Jul 7, 2023 at 4:46
  • 18
    Because creating a Single Point Of Failure is sooooo much better? Commented Jul 7, 2023 at 19:39
  • 15
    @brhans - Uh, that's how password login works anywhere. That's how it has to work, because doing anything to it before it gets to you just changes what "plaintext" password you use (ie, hashing clientside just makes that hash the "plaintext", and doesn't solve the underlying problem). Commented Jul 8, 2023 at 0:17
  • 11
    @brhans if users are sending you their hashed password to authenticate with, then you're doing it colossally wrong, and you've defeated the whole purpose of hashing, because now anyone who steals the hash can impersonate the user without even trying to recover the password from the hash. There was recently a make of IP camera that committed exactly that sin. Combined with a flaw that exposed password hashes, every single one of them was instantly wide open. Commented Jul 8, 2023 at 3:30