Welcome to Plaintext Passwords! This project is designed to raise awareness about the risks of storing passwords in plaintext. While it might seem humorous on the surface, the goal is to shed light on the importance of secure password storage practices in a world where cyberattacks are rampant.
We aim to educate developers, engineers, and security professionals about the dangers of plaintext passwords through an interactive and engaging experience. By demonstrating what not to do, we highlight the need for robust security measures like hashing, salting, and encryption.
plaintext
because, well, someone has to show what happens when you don't hash!Here's what you should be doing:
# Use strong hashing algorithms like bcrypt or Argon2 hashed_password = bcrypt.hashpw(password, bcrypt.gensalt()) # Never store secrets in plaintext; use sealed secrets or a vault. vault.store("password", hashed_password) # Use token-based authentication with OpenID Connect access_token = openid.get_access_token(user)
For more information on secure password practices:
Plaintext Passwords is a parody project meant to educate and entertain. We strongly discourage storing sensitive data in plaintext and recommend implementing proper cryptographic techniques to protect user data.
Go back