...
MSC18-EX0: Applications such as password managers may need to retrieve the original password in order to enter it into a third-party application. This is permitted, even though it violates the rule. The password manager is accessed by a single user and always has the user's permission to store their passwords and to display those passwords on command. ThereforeAs a result, provided the user is competent, the program's operation will be safe.
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ca5d5bb8cc849fbb-972d5ab2-4295411a-83b59996-2fcc74234bd6bfe84c53b63f"><ac:plain-text-body><![CDATA[ | [SD:[API 2006 | AA. Bibliography#API 06]] | Class | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d182d8213807896e-e536c59d-4c2749ac-98aa9d88-319a39c35abb4659e157a7bd"><ac:plain-text-body><![CDATA[ | [SD:[API 2006 | AA. Bibliography#API 06]] | Class | ]]></ac:plain-text-body></ac:structured-macro> |
Passwords never in clear text | ||||
Salt (cryptography) | ||||
Cryptographic hash function | ||||
|
...