Thanks for taking the time to answer these quandaries.
Last one: even if an attacker has both access to a hash and the hash function, if that hash function is secure, they still can’t reverse that to get the password, correct?
No they can’t
We're a place where coders share, stay up-to-date and grow their careers.
We strive for transparency and don't collect excess data.