Generate cryptographic hashes from text using the Web Crypto API. All hashing happens in your browser.
A hash function takes any input and produces a fixed-size output (a "digest"). Good hash functions are deterministic, fast to compute, and infeasible to reverse β making them ideal for integrity checks and checksums.
For storing user passwords, never use plain SHA-256. Use a slow, salted KDF like bcrypt, scrypt, or Argon2.