Simon Krajewski
Simon Krajewski
While I find this evil server operator argument somewhat contrived, I also don't see how the MD5 client-side hashing could be worse. I can see how there's a very strong...
I now read a bit about password shucking, if I understand correctly it's basically this situation expressed in Haxe code: ```haxe import haxe.crypto.BCrypt; function main() { var leakedMd5Hashes = ["48f03653ae8b6d062bb8b7ae177cb391"];...
At this point I'll close this old PR.
Probably fixed by https://github.com/HaxeFoundation/haxe/commit/5c3afcb73ef67bf0f177451e5b6cd99351bf5bf6
I'm told that this can be closed now!
Closing because obsolete.
Closing due to inactivity.
This has conflicts.
Makes sense to not have a console here!
This has conflicts and there was no follow-up, so I'll assume that this can be closed.