Introduction For this first post on my blog, I wanted to talk about the angular stone in information security nowadays: your passwords. Back in the days you only had a few websites where you would connect with a similar if not the same password. These days, I have probably a