Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They could still hash the long password, without trimming, and store 64 bits of that hash.


True, but then you'd have to make sure that all software that accesses that field is aware of the hash, and chances are if you have a legacy system like that, you have legacy software too.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: