Don't get me wrong, I strongly believe in storing user data safely, and 
especially passwords, hence my original question.  But as I mentioned, I'm 
basically trying to protect a customers email address at this point.  So if 
the attack vector I'm defending against is someone having direct access to 
the DB, whether physical or dumped.  Then they already have the email 
addresses I'm trying to protect.  So I'm paying to protect a password that 
will be superfluous. 

I do hear the message to plan ahead, but looking at bcrypt, it seems like I 
could scale the cost factor as and when data becomes more valuable, or when 
it becomes a killer app ;) It even has a method there to determine the cost 
from the previous hash which seems designed for that task?  Since I'm 
guessing it's not been added to help determine brute force efforts :) and 
now that I know the 'x' stuff is internally developed I feel more 
comfortable using it.

In the case of client side hashing, I'm worried about clear text passwords 
ending up in log files or some such, as just happened with fb last week.  
Since I have no control over the data between the clients, and the hosted 
execution environment.  This may possibly be the weakest link, or a debug 
statement left in code that accidentally does the same...

Thanks all for your feedback,
Peter

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to