Methods that rely on making something too computationally expensive for the attacker, or requiring more disk space for tables than the attacker can afford, are not a good choice for ensuring security at this point in time.
2 Likes