What is Jow Forumss favorite hash algorithm for passwords?

What is Jow Forumss favorite hash algorithm for passwords?

Attached: hash_functions.jpg (508x358, 14K)

MD5

Don't hash them or you cannot send the passwords to people who forgot theirs

absolutely based

kys

argon2id

it’s such a pain to crack

bcrypt with a work factor of 64

bcrypt, faggot

10 rounds of base64, and then 3 rounds of caesar.

I implemented my own so it's guaranteed unhackable. Also not falling for the open source meme

Sha 512

md5 hardened with two rounds of rot13

SHA1024 hardened with 8675309 rounds of rot13.

What hash, I'm not a junkie.
I save my passwords in a txt file without extension in a hidden folder.

I prefer MD5 aswell guess we're just old fashioned :)

this
bcrypt has a length limit
pbkdf2 is too primitive
using a raw data hash algorithm for passwords is for retards

rot13

>rot13
It's like you want to be hacked. Use rot26 instead.

imagine not using base64

Whirlpool

>No mention of CRC32

Attached: 1545083071677.jpg (672x787, 40K)

pbkdf2

this. argon2i for serverside hashing and argon2d for clientside hashing

>openly linking your pw hash method to your ip
good job faggots, backtracing all of you as we speak.

why-cant-i-hold-all-these-collisions.png

SHA256
The gold standard.

Attached: desert-woman-with-8legged-lion-blue-planets.jpg (1363x1079, 545K)

SHA3-512 salted with a hash of the rest of the user data.

kek

argon2i
discussion is over

fag enabler

SHA-512 and don't forget teh salt.

uint32_t h = 0;
while(const auto c = *(str++))
h += unsigned(c);
return h;

Is scrypt any good? I started using it in a current project of mine but it's not too late to change it yet

(scrypt == bcrypt) > pbkdf2 (salted hash, "difficulty" (hash multiple times) ) > salted hashes > naked hashes > plaintext

>gotfag
>faggot
are interchangeable, based

see and

>8675309 iterations
kek

you just have to change the indianness

just store it as plaintext

why the fuck would I hash a password?

who needs backend security anyway? just have good front end security

you don't need to store symmetric password and risk client's security if you have a sane authentication protocol

We pay chinese workers to write down and look up user passwords by hand.
We pay them in hash.

can I get uhhhh Merkle Damgard construction

bcrypt - all day, every day.
>bcrypt has a length limit
72 bytes, enough for most people.