Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You don't need to invert it, if the hash is used to issue a token on a centralized system you can ping the centralized system. At minimum you can establish whether someone has an existing account, and at maximum you could identify that account.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: