<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Bcrypt on Devops Monk</title><link>https://devops-monk.com/tags/bcrypt/</link><description>Recent content in Bcrypt on Devops Monk</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 04 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://devops-monk.com/tags/bcrypt/index.xml" rel="self" type="application/rss+xml"/><item><title>Password Encoding: BCrypt, Argon2, and DelegatingPasswordEncoder</title><link>https://devops-monk.com/tutorials/spring-security/password-encoding/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><guid>https://devops-monk.com/tutorials/spring-security/password-encoding/</guid><description>Why Passwords Must Be Hashed Storing plaintext passwords is a critical security failure. When a database is breached, attackers immediately have every user&amp;rsquo;s password — and because people reuse passwords, those credentials work on other sites too.
Password hashing is not encryption. Encryption is reversible. Hashing is one-way: you can verify a password by hashing it and comparing to the stored hash, but you cannot recover the original password from the hash.</description></item></channel></rss>