Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

FWIW it is still very much worth reading the article, since they talk about how they implement that approach. They bring up why they use an underscore, checksum'ing, entropy, etc.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: