Difference between revisions of "Talk:1286: Encryptic"

Explain xkcd: It's 'cause you're dumb.
Jump to: navigation, search
Line 8: Line 8:
  
 
::: ... interesting that google search didn't mentioned it :-) Seems bible have too low pagerank. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 10:32, 4 November 2013 (UTC)
 
::: ... interesting that google search didn't mentioned it :-) Seems bible have too low pagerank. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 10:32, 4 November 2013 (UTC)
 +
 +
 +
Another article about using passwords hints from multiple users to find the passwords from the breach. http://7habitsofhighlyeffectivehackers.blogspot.com/2013/11/can-someone-be-targeted-using-adobe.html [[User:Bugefun|Bugefun]] ([[User talk:Bugefun|talk]]) 11:06, 4 November 2013 (UTC)

Revision as of 11:06, 4 November 2013

It is unclear to me if these are actual hashes from Adobe file? That would be very cool... but actual file seems to have passwords in slightly different format. http://arstechnica.com/security/2013/11/how-an-epic-blunder-by-adobe-could-strengthen-hand-of-password-crackers/ 108.162.229.211 09:05, 4 November 2013 (UTC) pavel

I wouldn't call 3DES secure ... but yes, in this situation the real problem is not using per-user salt. Note that I would expect that at least some of those examples would be solvable ...any idea? Hmmm ... sword of weather vane and one of apostles might be Martin ([1]) ... -- Hkmaly (talk) 10:00, 4 November 2013 (UTC)
Umm. "Peter" does not seem to have 8 characters, does it? Encryption method suggests it should be 8 characters, as do 8 character boxes on the right... 108.162.229.211 10:43, 4 November 2013 (UTC) pavel
I'd say "weather vane sword", "name1" and "favorite of 12 apostles" is (Saint) Peter. "Weather vane" as symbol for the rooster in the denial, and the sword Peter used when Jesus was arrested. --108.162.254.177 10:25, 4 November 2013 (UTC)
... interesting that google search didn't mentioned it :-) Seems bible have too low pagerank. -- Hkmaly (talk) 10:32, 4 November 2013 (UTC)


Another article about using passwords hints from multiple users to find the passwords from the breach. http://7habitsofhighlyeffectivehackers.blogspot.com/2013/11/can-someone-be-targeted-using-adobe.html Bugefun (talk) 11:06, 4 November 2013 (UTC)