Post
Topic
Board Hardware
Re: The performance claims and prices are unrealistic
by
pcm81
on 28/01/2013, 04:36:32 UTC
SHA-256 is used to encrypt data

How does that work? Show me how to decrypt a SHA256 hash back to its original contents.
Step 1, generate random contents
Step 2, hash it
Step 3, compare to a known hash. If matches and random contents makes sense you done, if does not match loop to step 1.