• conciselyverbose@kbin.social
    link
    fedilink
    arrow-up
    9
    ·
    1 year ago

    In the example yes.

    In the real world, finding an input that produces the right hash output isn’t easy. And because a lot of users reuse passwords (don’t do it, but people do), a list of emails and passwords gives you an incredibly lazy and easy to do way to compromise accounts on other sites.