From 374818a822e903178a047a02a64d7492cf7a00a2 Mon Sep 17 00:00:00 2001 From: Kyle Spearrin Date: Sat, 15 Oct 2016 02:56:42 -0400 Subject: [PATCH] copy update --- _articles/security/password-salt-hash.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_articles/security/password-salt-hash.md b/_articles/security/password-salt-hash.md index 93bd4569..872631b0 100644 --- a/_articles/security/password-salt-hash.md +++ b/_articles/security/password-salt-hash.md @@ -11,8 +11,8 @@ Yes. bitwarden salts and hashes your master password with your email address on the client (your computer/device) before it is transmitted to our servers. Once the server receives the hashed password from your computer/device it is then salted -again with a cryptographically secure random value, hashed again and stored in our database. This process is repeated -every time you log in and hashes are compared. +again with a cryptographically secure random value, hashed again and stored in our database. This process is repeated and +hashes are compared every time you log in. The hashing functions that are used are one way hashes. This means that they cannot be reverse engineered by anyone at bitwarden to reveal your true master password. In the hypothetical event that the bitwarden servers were hacked and your