But, the original example is hashing the password. No encryption involved. So what makes anyone think that they can reverse a hash?
But, the original example is hashing the password. No encryption involved. So what makes anyone think that they can reverse a hash?