[Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently
Ray Dillinger
bear at sonic.net
Fri Sep 11 12:57:55 EDT 2015
On 09/11/2015 07:53 AM, Phillip Hallam-Baker wrote:
> A large number of the users likely had multiple accounts. The way sharks
> work is that first they try chatting a woman up with approach X till they
> are rejected. At that point they have invested some time in finding out
> about them and have as collateral a lot of personal details. So on approach
> 2 they can refine their strategy, oh I am also into ultimate pogo-frisbee
> what a coincidence!
>
> Welcome to fin-land.
A Sybil attack by any other name would still be as much of a
vulnerability. Right?
Bear
---
It occurred to me this morning that many system design flaws can
be traced to unwarrantedly anthropomorphizing the user. -- Steven Maker
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150911/870fbe63/attachment.sig>
More information about the cryptography
mailing list