From 8af9af5d95db874168475c6cf9edbe19b9bb6b1a Mon Sep 17 00:00:00 2001 From: Bruno Oliveira Date: Fri, 2 Sep 2016 15:49:29 -0300 Subject: [PATCH] Typo --- topics/threat/password-db-compromised.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/topics/threat/password-db-compromised.adoc b/topics/threat/password-db-compromised.adoc index 0d18bc3287..dd5a0f2cef 100644 --- a/topics/threat/password-db-compromised.adoc +++ b/topics/threat/password-db-compromised.adoc @@ -3,7 +3,7 @@ {{book.project.name}} does not store passwords in raw text. It stores a hash of them using the PBKDF2 algorithm. It actually uses -a default of 20,000 hasing iterations! This is the security community's recommended number of iterations. +a default of 20,000 hashing iterations! This is the security community's recommended number of iterations. This can be a rather large performance hit on your system as PBKDF2, by design, gobbles up a significant amount of CPU. It is up to you to decide how serious you want to be to protect your password database.