IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Somebody has to, nicht wahr?
If I don't have my username and password on my PC, but the place I'm connecting to does, the problem still exists. If someone gets inside, the information is at risk.

One would think that the cloud is run by people who know what they're doing, so accounts are protected, but we know of too many cases where that isn't true.

IIRC, Kerberos tries to minimize this problem by passing tokens around. But the server still has a database of valid passwords from which it constructs tokens.

Defense in depth makes sense, but it's too easy to forget all this stuff...

Cheers,
Scott.
New LastPass has been cracked before, IIRC
Regards,
-scott
Welcome to Rivendell, Mr. Anderson.
New <boggle>
New Re: <boggle>
http://news.cnet.com...-20060464-83.html
Regards,
-scott
Welcome to Rivendell, Mr. Anderson.
New Thanks.
New Database of valid passwords?
Or valid password hashes?


New Dunno.
I suppose with public and private keys that there are ways to know whether a username and password are valid without having and storing the actual original values.

But AFAIK, the problem remains. If the system is compromised, then it's only a matter of time before account information can compromised as well.

But I'm no expert on this stuff...

Cheers,
Scott.
New Makes little difference
http://arstechnica.c...f-your-passwords/

ArsTechnica gave three experts a list of over 16000 cryptographic password hashes. The best one recovered 90% of the plaintext passwords.

The list of "plains," as many crackers refer to deciphered hashes, contains the usual list of commonly used passcodes that are found in virtually every breach involving consumer websites. "123456," "1234567," and "password" are there, as is "letmein," "Destiny21," and "pizzapizza." Passwords of this ilk are hopelessly weak. Despite the additional tweaking, "p@$$word," "123456789j," "letmein1!," and "LETMEin3" are equally awful. But sprinkled among the overused and easily cracked passcodes in the leaked list are some that many readers might assume are relatively secure. ":LOL1313le" is in there, as are "Coneyisland9/," "momof3g8kids," "1368555av," "n3xtb1gth1ng," "qeadzcwrsfxv1331," "m27bufford," "J21.redskin," "Garrett1993*," and "Oscar+emmy2."
New Neat. Thanks.
     Why you shouldn't let your browser remember passwords. - (Another Scott) - (13)
         same reason you shouldn't store them on disk -NT - (boxley) - (11)
             Somebody has to, nicht wahr? - (Another Scott) - (8)
                 LastPass has been cracked before, IIRC -NT - (malraux) - (3)
                     <boggle> -NT - (Another Scott) - (2)
                         Re: <boggle> - (malraux) - (1)
                             Thanks. -NT - (Another Scott)
                 Database of valid passwords? - (pwhysall) - (3)
                     Dunno. - (Another Scott)
                     Makes little difference - (scoenye) - (1)
                         Neat. Thanks. -NT - (Another Scott)
             shouldnt store passwords on your local disk - (boxley) - (1)
                 Yup. -NT - (Another Scott)
         Re: Why you shouldn't let your browser remember passwords. - (folkert)

Almost, but not quite, entirely unlike tea.
155 ms