You can also corrupt the resulting hash before saving it. How complex the 
corruption is is up to you. Without knowing how the hash is corrupted, no 
amount of brute force can decrypt it. 

Bob S


> On Feb 19, 2026, at 2:44 AM, Georges Malamoud via use-livecode 
> <[email protected]> wrote:
> 
> Hello I use this
> encrypt tContent using "aes-256-cbc" with password tPass and salt tSalt
> 
> of course the stack is password protected and variables tPass and tSalt are 
> encrypted separately beforehand
> 
> Is there something better ?
> 
> Georges
> _______________________________________________
> use-livecode mailing list
> [email protected]
> Please visit this url to subscribe, unsubscribe and manage your subscription 
> preferences:
> http://lists.runrev.com/mailman/listinfo/use-livecode


_______________________________________________
use-livecode mailing list
[email protected]
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to