Skip to main content


What We Do in the /etc/shadow Cryptography with Passwords