08:27:03 d​reamlove33:matrix.org: Thank you for the detailed explanation [@jeffro256:monero.social](https://matrix.to/#/@jeffro256:monero.social)
08:27:05 d​reamlove33:matrix.org: Really appreciate that!
14:36:37 s​anada08:matrix.org: https://github.com/monero-ecosystem. ---> the repos are archived.
14:37:00 s​anada08:matrix.org: https://moneroecosystem.org. -----> link is broken
14:44:19 o​frnxmr:xmr.mx: Yes
14:46:13 o​frnxmr:xmr.mx: None of that is monero-project. Was a community maintained repo & website
14:46:14 o​frnxmr:xmr.mx: community maintained org* and website
16:37:10 vU7e995b: Aside from performance/resource requirements, are there any reasons RandomX should not be used for password-based key derivation?
16:37:30 vU7e995b: just a curiosity, I'm not very familiar with the problem space
16:41:51 sech1: There are better hash functions designed specifically for this, like Argon (which is a part of RandomX already)
16:51:49 vU7e995b: Understood. Is there any reason why it would be unsafe to use RandomX as a pbkdf?
16:57:30 sech1: Non-constant calculation time, for starters