Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Swordmaker
Surprisingly, that’s probably a pretty good password. LOL!

Not really, subject to dictionary attack.

needed *#&5!^ added to the end.


57 posted on 05/27/2016 9:27:53 PM PDT by 867V309 (It's over. It's over now.)
[ Post Reply | Private Reply | To 38 | View Replies ]


To: 867V309
Not really, subject to dictionary attack.

Her password's nine proper nouns long.

An attacker would have to guess that she had a penchant for such a password form and then deploy his proper noun dictionary against her, hoping all of her words were in his dictionary.

And that assumes an offline attack, where the attacker can brute-force at GPU speeds.

In a more realistic scenario, her server would impose increasing time penalties for incorrect guesses, thus rendering his attack hopeless immediately, even if he knew the form of her password, which, of course, he doesn't.

75 posted on 05/28/2016 1:32:01 AM PDT by cynwoody
[ Post Reply | Private Reply | To 57 | View Replies ]

To: 867V309
Not really, subject to dictionary attack.

Words run-on like that are generally not found in dictionary attacks, because a dictionary attack will not know when a word has been found. There are no natural boundaries in that run-on list of character names. It's the same reason some password experts are now recommending run-on nonsense phrases which include proper names as the best most unbreakable passwords.

76 posted on 05/28/2016 1:48:25 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 57 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson