Posted by Alexander Mueller on 01/10/08 23:35
Harlan Messinger wrote:
>
> Right, that's what I already said (see below): both would be equally
> weak situations. It's for that reason that a truly secure application
> *stores* the *hash* but *expects* the *password*. Your proposal is
> compatible only with an application that has this other security hole.
Sorry, but what should be weak about this? You havent backed your
statement with nothing. Please state facts and not only rumors.
Navigation:
[Reply to this message]
|