Post
Topic
Board Hardware
Re: The performance claims and prices are unrealistic
by
PuertoLibre
on 28/01/2013, 19:55:37 UTC
SHA-256 is used to encrypt data

How does that work? Show me how to decrypt a SHA256 hash back to its original contents.
Step 1, generate random contents
Step 2, hash it
Step 3, compare to a known hash. If matches and random contents makes sense you done, if does not match loop to step 1.
In reality this is an infinite loop that produces no results.  It is more likely that all of the oxygen in the room you are in is distributed poorly and none of it is near you.
I am going to say that you have made the most elegant comeback I have ever read in a long while.

You are a rising star in my book!

Last I checked, hashing and encryption are two different things. They only barely resemble one another on a superficial level.