‘fhxGH5h’
Ain’t Close To Being A Safe Password Anymore Cheap GPUs are rendering strong passwords useless |
|
scream-of-consciousness; "If you're trying to change minds and influence people it's probably not a good idea to say that virtually all elected Democrats are liars, but what the hell."
‘fhxGH5h’
Ain’t Close To Being A Safe Password Anymore Cheap GPUs are rendering strong passwords useless |
|
"If the number of Islamic terror attacks continues at the current rate, candlelight vigils will soon be the number-one cause of global warming. " |
This will be the comment box |
Actually, the next step is a physical key with a combination pin registered with your ISP. Goodbye privacy.
Casca
Each attempt will take several seconds to fail and most reputable websites, eg. bank, cc, brokerage, stop taking attempts after three failures. So these timings are not accurate.
What about an alpha numeric password like: Pen15_8====>
The three strikes and you're out only works for direct on-line attempts. What if they've stolen a password file. Passwords are encrypted with a one-way method. IOW they cannot be decrypted back to clear text.
Since most people use the same small subset of passwords (guilty), if you can get one password file, you can march through a whole comp center or multiple social networking and/or online checking, Amazon, etc., etc. sites.
See The Cookoo's Egg by Cliff Stoll. Old but still relevant.
JLW III
With this RF ID chip implanted in my wrist, and the password I type in, I am secure.
CF in CO
When last doing admin, the password file was chunked into multiple pieces, with user identifiable stuff in one, and encrypted passwords in the other, and not readable by anyone but root{unix}, don't know re NT.
If it is a one-way encryption, how do you know when you've cracked this stolen password file? And what rewards are you gonna get for doing all this work?
Working at an ISP, we had a common LONG password that was changed when employees left, etc, and I think monthly. It was gobbldygook unless you tried to say it aloud, and then it would almost make sense. We were locked into sudo, and EVERY thing we did was logged, subject to inspection.
Relatedly, the fobs that generate an 8(?) digit number on a time-basis have apparently been cracked, and the supplier is voluntarily replacing some 2.5 million of them.
In case you are unaware, the login is challenged, and you have to know the password AND the currently valid number the fob has generated and is displaying for your id. The Pentagon uses a lot of these, as does NASA. Apparently the Chinese have gotten some code that makes breaking in a lot easier, so new fobs for everyone. At no charge... so there MUST be a danger of hacking.
I guess stealing a fob is better than an eye or a thumb for retinal or print validation...
tomw