[Cryptography] millions of Ashley Madison bcrypt hashes cracked efficiently

Ray Dillinger bear at sonic.net
Fri Sep 11 12:57:55 EDT 2015

On 09/11/2015 07:53 AM, Phillip Hallam-Baker wrote:

> A large number of the users likely had multiple accounts. The way sharks
> work is that first they try chatting a woman up with approach X till they
> are rejected. At that point they have invested some time in finding out
> about them and have as collateral a lot of personal details. So on approach
> 2 they can refine their strategy, oh I am also into ultimate pogo-frisbee
> what a coincidence!
> Welcome to fin-land.

A Sybil attack by any other name would still be as much of a
vulnerability.  Right?

It occurred to me this morning that many system design flaws can
be traced to unwarrantedly anthropomorphizing the user. -- Steven Maker

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150911/870fbe63/attachment.sig>

More information about the cryptography mailing list