minus-squarezovits@lemmy.worldtoCybersecurity - Memes@lemmy.world•Obscure password requirementslinkfedilinkarrow-up3·24 days agoOr by generating the hashes of all expected permutations of the password the user has just set, and keeping them until the next password is set to compare against. Granted, that would be a prodigious number, but technically doable. linkfedilink
minus-squarezovits@lemmy.worldtomemes@lemmy.world•The Sandwich Thieflinkfedilinkarrow-up3·1 month agoIf your comment is sarcasm, then it’s brilliant. linkfedilink
zovits@lemmy.world to Showerthoughts@lemmy.world · 1 year agoI just realized how incredible it is that we don't have toes growing out of our ears.plus-squaremessage-squaremessage-square3fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareI just realized how incredible it is that we don't have toes growing out of our ears.plus-squarezovits@lemmy.world to Showerthoughts@lemmy.world · 1 year agomessage-square3fedilink
minus-squarezovits@lemmy.worldtoShowerthoughts@lemmy.world•Parents used to warn their kids that literature would rot their brains. Then it was the radio, TV, and video games. Now it's TikTok.linkfedilinkarrow-up0·1 year agoNo, tiktok is not digital media. It’s a chinese cyber warfare weapon of mass destruction. linkfedilink
Or by generating the hashes of all expected permutations of the password the user has just set, and keeping them until the next password is set to compare against. Granted, that would be a prodigious number, but technically doable.