If the codes are made with a hash, then the odds are quite against me. There’s no telling what the input was. Even a reused nonce would prevent me from reverse engineering it if I only had the hash output and no clue where to start. I guess I’m looking for a design flaw that ...