Home - r-l-plus.com

Looking for some nsa in sha

  • 71%
  • (708)
Basically, the algorithm takes a string of information and turns it into a bit hash number. Well, let's say you have a twitter password and it is " abc. It's very, very difficult to work backwards from the output to get the original input, "abc," which is your password. So, when Twitter saves your username and password onto its big file of everyone's usernames and passwords, it's your username and the SHA-1 hash of your real password that is actually listed.

Comments (2)

You must be logged in to post wall comments. Please Login or Signup (free).