Hey, thanks for your question! I'm happy to provide more details on the password hashing. The login system uses bcrypt to hash passwords. This is a strong one-way hashing algorithm that makes it very difficult to reverse engineer the original password. Essentially, when a user registers, their password is run through bcrypt, and the resulting hash is stored in the database. When the user logs in, their entered password is also hashed using bcrypt, and the result is compared to the stored hash. If they match, the user is authenticated. Let me know if you have any further questions.
We use cookies to personalize your experience. By continuing to visit this website you agree to our use of cookies
donnie.collier
DAVMAR
4 weeks ago