Or valid password hashes?
Database of valid passwords?
Or valid password hashes?
|
|
Dunno.
I suppose with public and private keys that there are ways to know whether a username and password are valid without having and storing the actual original values.
But AFAIK, the problem remains. If the system is compromised, then it's only a matter of time before account information can compromised as well. But I'm no expert on this stuff... Cheers, Scott. |
|
Makes little difference
http://arstechnica.c...f-your-passwords/
ArsTechnica gave three experts a list of over 16000 cryptographic password hashes. The best one recovered 90% of the plaintext passwords. The list of "plains," as many crackers refer to deciphered hashes, contains the usual list of commonly used passcodes that are found in virtually every breach involving consumer websites. "123456," "1234567," and "password" are there, as is "letmein," "Destiny21," and "pizzapizza." Passwords of this ilk are hopelessly weak. Despite the additional tweaking, "p@$$word," "123456789j," "letmein1!," and "LETMEin3" are equally awful. But sprinkled among the overused and easily cracked passcodes in the leaked list are some that many readers might assume are relatively secure. ":LOL1313le" is in there, as are "Coneyisland9/," "momof3g8kids," "1368555av," "n3xtb1gth1ng," "qeadzcwrsfxv1331," "m27bufford," "J21.redskin," "Garrett1993*," and "Oscar+emmy2." |
|
Neat. Thanks.
|