Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

imo, their are comparing the hash of the 3 versions against a stored hash. This will help slowing down brute force attacks(http://en.wikipedia.org/wiki/Bcrypt), although it does make brute force attack 3 times easier, since now you can hit the correct password 3 times with the same set of characters.


I'd not confuse 3 hash-rounds with anything to do with Bcrypt, which is several orders of magnitude off from what most-all Bcrypt libs will have as their default rounds. Most that I've browsed will have a default work-factor of 10 (or 1024 -- 210 -- rounds), with Python's de jour using a factor of 12 (or 4096 rounds).




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: