Skip to content

Why use passwords?

 

Strong vs weak

 

 

Limitations

Salting & Hashing

2FA

Alternatives