Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The attacker would then intercept that scrypt hash sent from the client and use it to authenticate.


You can't. The scrypt hash should be protected by HTTPS the same way a website password is protected by HTTPS.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: