top | item 9636715 (no title) sigden | 10 years ago What legitimate use case is there for implementing a 2-way encryption method over a hash function for passwords? discuss order hn newest paulhauggis|10 years ago I never said it was the best method to use over a hash function. However, it's much better than plain text and it would be unethical to say the company didn't have any security of the original poster doesn't know for sure. ryanlol|10 years ago Customer support. A human can then verify the user even if they can only remember a part of the password. stephenr|10 years ago Sounds like a security flaw ripe for social engineering load replies (1)
paulhauggis|10 years ago I never said it was the best method to use over a hash function. However, it's much better than plain text and it would be unethical to say the company didn't have any security of the original poster doesn't know for sure.
ryanlol|10 years ago Customer support. A human can then verify the user even if they can only remember a part of the password. stephenr|10 years ago Sounds like a security flaw ripe for social engineering load replies (1)
paulhauggis|10 years ago
ryanlol|10 years ago
stephenr|10 years ago