I know you gotta store the passwords hashed but doesn’t that just move the goalposts? How come someone can’t use the hashed end result to get into the service it was used for?
I know you gotta store the passwords hashed but doesn’t that just move the goalposts? How come someone can’t use the hashed end result to get into the service it was used for?
The main difference between encryption and hashing is that hashing only works in one direction, while encryption is meant to be decrypted later. With hashing, you can create a special combination from a password or something, then you can test for that same initial password by using the same hash process on new input.