Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

frezik ,

That's not how that works. If you were using MD5 and then immediately SHA256 the output and not using it for anything else, that would be fine. You're not accomplishing much in this specific case, but it'd be fine.

When you layer security, the attacker has to pull back each layer. You don't rely on any singular layer. If the attacker needs biometrics AND a code AND a physical key, that's very good security.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • technology@lemmy.world
  • random
  • incremental_games
  • meta
  • All magazines