This is not “watch a video and nod.” You will produce a real interview artifact and a shareable win. Step 4 logs your completion and generates your accomplishment summary.
Completion ID: —
Status: Not submitted
Step 1 — Hashing is a “fingerprint” (Avalanche Effect)
Type the two inputs below. You’ll see how a single character change produces a completely different fingerprint.
Step 2 — Salting changes the game (same password ≠ same hash)
Enter a salt and see how it changes the outcome. This is why stolen databases shouldn’t be cheap to crack offline.
Step 3 — MFA is a second proof (not “extra password”)
Answer this: if an attacker steals your password, what does MFA block? Your answer becomes part of your interview artifact.
Step 4 — Generate your completion + send results (email + counter)
This will: (1) generate your interview artifact, (2) generate a completion ID + timestamp, (3) send it to your Make.com webhook.

