mirror of
https://github.com/bitwarden/help
synced 2025-12-06 00:03:30 +00:00
Does bitwarden use a salted hash for my password? article ref #2
This commit is contained in:
19
_articles/security/password-salt-hash.md
Normal file
19
_articles/security/password-salt-hash.md
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
layout: article
|
||||||
|
title: Does bitwarden use a salted hash for my password?
|
||||||
|
category: Security
|
||||||
|
featured: true
|
||||||
|
popular: false
|
||||||
|
tags: [encryption, hash]
|
||||||
|
---
|
||||||
|
|
||||||
|
Yes.
|
||||||
|
|
||||||
|
bitwarden salts and hashes your master password with your email address on the client (your computer/device) before it is
|
||||||
|
transmitted to our servers. Once the server receives the hashed password from your computer/device it is then salted
|
||||||
|
again with a cryptographically secure random value, hashed again and stored in our database. This process is repeated
|
||||||
|
every time you log in and hashes are compared.
|
||||||
|
|
||||||
|
The hashing functions that are used are one way hashes. This means that they cannot be reverse engineered by anyone at
|
||||||
|
bitwarden to reveal your true master password. In the hypothetical event that the bitwarden servers were hacked and your
|
||||||
|
data was leaked, the data would have **no value** to the hacker.
|
||||||
Reference in New Issue
Block a user