Hacker News new | past | comments | ask | show | jobs | submit login

> hashing an internal secret AND the data

This is essentially how HMAC works (HMAC is mentioned in the article). It's generally considered safer to use a 'real' HMAC algorithm instead of rolling your own.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: