Post
Topic
Board Hardware
Re: The performance claims and prices are unrealistic
by
Phinnaeus Gage
on 28/01/2013, 04:53:20 UTC
SHA-256 is used to encrypt data

How does that work? Show me how to decrypt a SHA256 hash back to its original contents.
Step 1, generate random contents
Step 2, hash it
Step 3, compare to a known hash. If matches and random contents makes sense you done, if does not match loop to step 1.
Hilarious!

Albeit not the most technical guy here, I find this thread informative, even believing pcm81, but I see doubters, and am getting confused. I dearly seek the truth on this issue, and hope a civil dialog continues.