Hacker News new | past | comments | ask | show | jobs | submit login

That doesn't make sense. Three days after you sign-up (i.e. no cache), if they are sending you your password, it can only be because it's plaintext. Unless they are bruteforcing the hash for your convenience... :-)



They could two-way encrypt which seems safer to me than plain text but some disagree (I'm not sure why).


Only if the keys are well controlled.


If the keys were well controlled, you wouldn't have to worry about plaintext passwords in the DB either. But passwords get leaked all the time. If the key is sitting somewhere locally, when they break in to steal the passwords, they can steal the key too. There's no way the program can reverse the password without having the key pretty easily accessible.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: