Skip to content
 
If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Krebs On Security)   Cybercriminals apparently use even worse passwords than the rest of us   (krebsonsecurity.com) divider line
    More: Dumbass, User, Authentication, Password, E-mail, Cryptography, Password strength, E-mail address, Passphrase  
•       •       •

580 clicks; posted to STEM » on 04 May 2021 at 6:11 PM (6 days ago)   |   Favorite    |   share:  Share on Twitter share via Email Share on Facebook



5 Comments     (+0 »)
View Voting Results: Smartest and Funniest
 
6 days ago  
MATLOCK
 
6 days ago  
Criminals are just people.

That's why my password is, "Please sir, I have a wife and three children who can't afford to eat. Please do not hack me. I will probably have to kill myself if I lose any more" to appeal to their ethical side.

It takes a long time to write, but it's worth it.

/unmarried
//with a cat
 
6 days ago  
Oh, that makes me wonder. I wonder how long something has to be to repeat a hash on a common algorithm (probably not something like Argon as that spits out different results every time so repeats would be even less likely, but something consistent like SHA256).

EG, If you hash 1-char numeric only. ABC123 has 10 possible outcomes. So there's a 1/10 chance that DEF987 would have the same hash has as ABC123.

Lets say it has the same outcome, 5, if your password is DEF987, and they reverse the hash, they'd probably spit out ABC123 from the table as it would have been the thing attempted first in ascending order. So reversing would say, 5 is ABC123 unless they make a point of checking other possible outcomes.

But then, is a repeat so unlikely that a hacker just wouldn't think to check other possible outcomes from a hash in favour of trying other algorithms ("Hmm, SHA-256 didn't work, maybe it's actually SHA-512").
 
6 days ago  
Oh, I just realised the flaw in my cunning plan. A matching hash would validate in the event of two inputs getting the same output.
 
6 days ago  
Fark user imageView Full Size

Oblig
 
Displayed 5 of 5 comments

View Voting Results: Smartest and Funniest

This thread is closed to new comments.

Continue Farking





On Twitter



  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.