Quote Originally Posted by Isana View Post
Not disagreeing with you there haha, but when I typed that I was just thinking about someone simply taking a hash and comparing it against a large collection of other hashes generated from common passwords, words, etc. since that's generally the first thing most people would do with a hash.
Makes sense. Not really anything I considered all that much.

Unique password example: Hacker, suck my balls!