Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't have anything super productive to say here and this comment is more emotive than substantive but I'm going to say it anyways: it is remarkable to me how much peer review people demand from password hash constructions (which are quite unlikely to fail dramatically) than from every other cryptographic primitive they use.


Well, I don't know about that. I really want all algorithms and implementations checked out by at least a few people that write up a report. Even something like Blake3 could be a bit iffy under that criteria.


Blake3 is not, in fact, a bit iffy.


Sure, but the tree structure is "made up" and has had less scrutiny than something than SHA2 SHA384 for example. I use it, but that's where my border line is.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: