|
You are here |
www.splitbrain.org | ||
| | | | |
defuse.ca
|
|
| | | | | [AI summary] An individual attempts to crack 6 million unsalted LinkedIn user passwords using a large dictionary attack tool to demonstrate the critical importance of salting in password security. | |
| | | | |
pboyd.io
|
|
| | | | | Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean.... | |
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
blog.cynosureprime.com
|
|
| | | Recovered Percent Total 360,213,049 Usable data 359,005,905 355,886,686 99.13% Unique 116,822,086 113,830,176 97% Salted hashes 68... | ||