Given a bcrypt password (the hash) and the secret key, and reasonably high complexity settings, would it be safe to assume that it wouldn’t be practical to bruteforce that data?
I’m wondering how a system could be built in which we don’t know details of reports for ugly mugs, but so that those lists can be shared. It must be searchable by those fields
SA adjacent Show more