Posted by Harlan Messinger on 01/11/08 04:00
Alexander Mueller wrote:
> Harlan Messinger wrote:
>>
>> Right, that's what I already said (see below): both would be equally
>> weak situations. It's for that reason that a truly secure application
>> *stores* the *hash* but *expects* the *password*. Your proposal is
>> compatible only with an application that has this other security hole.
>
> Sorry, but what should be weak about this? You havent backed your
> statement with nothing. Please state facts and not only rumors.
I explained it already. Sorry if it went by you.
Navigation:
[Reply to this message]
|