Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On 7/24/2013 12:05 AM, Ben Eisenbraun wrote: > On Tue, Jul 23, 2013 at 11:16:06PM -0400, Bill Horne wrote: >> Since my password isn't in a dictionary, and doesn't contain any common >> substitutions that would allow for guessing, I'm not concerned about the >> breach. > Dictionary attacks are kind of... passe. It's all password lists culled > from the numerous other cracked sites and targeted brute force GPU > cracking these days: > > http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/ > > But your basic strategy works okay provided you never reuse a password, > since you can't really ever know what the security on the other side of > a web page you didn't write looks like. Ubuntu salted and hashed their > passwords, but plenty of sites just store them in plaintext or use fast > hashing schemes like MD5 which are quick to brute force with a GPU > cracking tool. > Point taken. My old password was just for "I don't care" sites, such as yahoo groups, where it wouldn't matter much if it /were/ hacked, since all anyone could do would be to post a message pretending to be me, to people who don't know me anyway. However, the more I thought about it, and the places I'd used it, the more I hastened to get the passwords changed. We've all heard about the "Help! I got mugged on vacation!" scams, and although I'm ever-so-eager to find out which of my email contacts would rush to Western Union and wire thousands of dollars to <random foreign city>, I don't /have/ any email contacts on any of the sites I've used that password for - but I realized that they might have been auto-collecting address I sent things to. The arms race continues. Bill -- Bill Horne 339-364-8487
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |