Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Of course, the flip side of this is that we're veering off into attacks where you're targeting one specific person and know a bit about how they've chosen their password.

If you want to mount such an attack, fine, but most of us are dealing with the much-more-common threat of someone who gets a file or a database of hashed passwords and wants to crack them all in one go.



The analysis applies to that threat as well; it just adds some constant number of bits of entropy.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: