boxerboy1168 wrote: » Can you break down for me how the hash function converts a plaintext communication into an encrypted communication so I can't sniff the data over TCP/IP communications? Just really struggling with this one right now.