I'd wager most, if not all of them. Ideally you'd have a program you want to use because it's promising, but instead you keep returning to whatever you used before that because certain use cases aren't handled well (or at all).
The world isn't a simple black-and-white place.
No, I get that, but the title of the article is just so vague I didn't even want to click the link anymore 😅 thanks for the clarification now!
By that analogy they're not even putting crap on your plate, they're putting stickers on your food telling you to try other food. I don't want stickers on my food even if they're advertising something I might like 😭
I usually (but not often enough tbh) refer to owasp documentation, like this one https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html They basically say elliptic curves for asymmetric encryption, or RSA with a key of at least 2048 bits
@NightFantom
@slrpnk.net