In this example, we retrieve the cookie and split it into two parts - the hash and the salt. We then use the salt to hash the sensitive data again and compare it to the original hash stored in the cookie. If the hashes match, we know that the data is valid and hasn't been tampered with. Package library: This example doesn't require any additional package/library.