Client-side tool to generate/verify password hashes with realistic parameters. Helpful for debugging integrations and understanding how salts, memory, and iterations affect cost. Runs locally—no passwords leave your browser.
Your data security is our top priority. All hashing and verification happen in this browser. This tool does not store or send your password nor hashes outside of the browser. See source code in: https://github.com/authgear/authgear-widget-password-hash
The file name remains in my download history like a punctuation mark. It still promises ceremony. But the thing I took from it was smaller and stranger: a reminder that the things we build also build us, and that every version number is a palimpsest of choices—tiny, stubborn acts of attention—invisible until you unpack them.
Who wrote these files? A product team sifting through feature requests? An artist moonlighting as a developer? The answer blurred, because the archive refused to be only one thing. It was both tool and diary, code and counsel. The rar file, compressed to save space, had compressed time too: the past iterations, the arguments over iconography, the late-night compromises that become the designs millions accept without thinking. Adobe-Photoshop-2024-25.11--Win-.rar
The notes read like marginalia from a software confessing its own ambitions. It spoke in short lines—no more than a thought or a bug fix away from poetry. The file name remains in my download history
Inside was a file tree, neat and misleading. Folders nested like Russian dolls—installation, resources, samples—but behind the expected executables and DLLs lived something else: fragments of someone’s interface experiments, color palettes shelved like secret recipes, and a directory labelled "Notes-2024_confessions.txt." Who wrote these files
"Pixels remember the hand that moved them," one entry began. "Undo is a promise and a threat."
The Archive
I closed the VM and thought about how we name our tools. We file them under versions, trying to impose a forward motion—2024, 25.11—like steps on a ladder. But in the margins, in the human syntax that never quite fits into update logs, the real work happens. The colors that remind us to be kinder. The undo that offers a gentle alternative, not just a cancellation. The interface that listens.
$2a$ vs $2b$), or forgetting a pepper.Open source Auth0/Clerk/Firebase alternative. Passkeys, SSO, MFA, passwordless, biometric login.