Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

True, but then you'd have to make sure that all software that accesses that field is aware of the hash, and chances are if you have a legacy system like that, you have legacy software too.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: