08:27:03
dreamlove33:matrix.org:
Thank you for the detailed explanation [@jeffro256:monero.social](https://matrix.to/#/@jeffro256:monero.social)
08:27:05
dreamlove33:matrix.org:
Really appreciate that!
14:36:37
sanada08:matrix.org:
https://github.com/monero-ecosystem. ---> the repos are archived.
14:37:00
sanada08:matrix.org:
https://moneroecosystem.org. -----> link is broken
14:44:19
ofrnxmr:xmr.mx:
Yes
14:46:13
ofrnxmr:xmr.mx:
None of that is monero-project. Was a community maintained repo & website
14:46:14
ofrnxmr:xmr.mx:
community maintained org* and website
16:37:10
vU7e995b:
Aside from performance/resource requirements, are there any reasons RandomX should not be used for password-based key derivation?
16:37:30
vU7e995b:
just a curiosity, I'm not very familiar with the problem space
16:41:51
sech1:
There are better hash functions designed specifically for this, like Argon (which is a part of RandomX already)
16:51:49
vU7e995b:
Understood. Is there any reason why it would be unsafe to use RandomX as a pbkdf?
16:57:30
sech1:
Non-constant calculation time, for starters