DEV Community

0 seconds of 52 minutes, 52 secondsVolume 90%
Press shift question mark to access a list of keyboard shortcuts
00:00
00:00
52:52
 
Tim Ermilov
Tim Ermilov

Posted on

11 6

BxJS Weekly Episode 65 - javascript news podcast

Hey dev.to community!

BxJS Weekly Episode 65 is now out! πŸš€
Listen to the best javascript news of the week in a podcast form right here.

Here's all the mentioned links (also found on github):

Getting started:

Articles & News:

Tips, tricks & bit-sized awesomeness:

Releases:

Libs & demos:

Interesting & silly stuff:

Any feedback is appreciated 😁

Additional stuff:

Social media links:

If you enjoy my content, please consider supporting me πŸ˜‰

Hostinger image

Get n8n VPS hosting 3x cheaper than a cloud solution

Get fast, easy, secure n8n VPS hosting from $4.99/mo at Hostinger. Automate any workflow using a pre-installed n8n application and no-code customization.

Start now

Top comments (3)

Collapse
 
zanehannanau profile image
ZaneHannanAU β€’

Just saying -- storing the salt alongside the hash is very common. It's used just about everywhere (/etc/shadow, bcrypt in general…).

The alternative is: how are you to be able to log in? If the salt isn't stored, then the hash becomes useless. If it is stored, but is constant across the database; then what point does the salt have? It would be a problem were it sha1 or similar, but it isn't.

Other than that… argon2 is quite strong so far at least.

Collapse
 
yamalight profile image
Tim Ermilov β€’ β€’ Edited

But if your DB is leaked - wouldn't that make decrypting password easier? πŸ€”
Having one common salt that's not in DB would mean that attacked upon acquiring that DB would have to first figure out what that salt was.
Or am I just misunderstanding something here? πŸ€”

Edit: Just did some googling, and apparently I totally confused salt with encryption keys used in a different set of algos all this time. I am a bit of an idiot πŸ€¦β€β™‚οΈ

Collapse
 
zanehannanau profile image
ZaneHannanAU β€’

Yeah. Main difference is between initialization vector/key (you keep the initialization vector and remember the key) and a randomness adder (salt). A salt and an IV are similar, in that they introduce uniqueness into place there might not be otherwise.

Billboard image

Create up to 10 Postgres Databases on Neon's free plan.

If you're starting a new project, Neon has got your databases covered. No credit cards. No trials. No getting in your way.

Try Neon for Free β†’

πŸ‘‹ Kindness is contagious

Please leave a ❀️ or a friendly comment on this post if you found it helpful!

Okay