Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, for one thing, don't use just one round of SHA-256. Or more generally: don't use the same algorithm as everyone else. Chain together different hash functions, and/or run them more than once.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: