diff --git a/topics/threat/password-db-compromised.adoc b/topics/threat/password-db-compromised.adoc index 0d18bc3287..dd5a0f2cef 100644 --- a/topics/threat/password-db-compromised.adoc +++ b/topics/threat/password-db-compromised.adoc @@ -3,7 +3,7 @@ {{book.project.name}} does not store passwords in raw text. It stores a hash of them using the PBKDF2 algorithm. It actually uses -a default of 20,000 hasing iterations! This is the security community's recommended number of iterations. +a default of 20,000 hashing iterations! This is the security community's recommended number of iterations. This can be a rather large performance hit on your system as PBKDF2, by design, gobbles up a significant amount of CPU. It is up to you to decide how serious you want to be to protect your password database.