this post was submitted on 02 Aug 2023
31 points (100.0% liked)

Interesting

555 readers
1 users here now

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 5 points 1 year ago* (last edited 1 year ago) (3 children)

Why is any amount of years in thousands not green? The matrix is skewed towards orange and red to make it seem riskier. This is a biased graph.

Not to mention the computer specs needed to crack these passwords are not mentioned. A "hacker" still needs libraries of their own to crack anything, which might find the password or might not, and no method is instant.

The ways to crack, at least with brute force, mean it's iterative. You either start with the most common combinations of all numbers or all letters, and then move incrementally. Then start mixing. There are so many combinations that nothing is ever instant.

[–] [email protected] 4 points 1 year ago

For everything longer than a couple of years, it becomes more relevant what future hardware can do, I think. Would be interesting to see such a table from 20 or 40 years ago.

[–] [email protected] 1 points 1 year ago

14 numbers [ = 10^14^ combinations]: 41 min [ = 2460 s]

This works out to 40 billion guesses per second. Can you calculate 8 password hashes in one 5GHz clock cycle?! If the hash&salt algorithm is any good, rainbow tables will not work, either. You would need the undivided power of some serious botnet to get these times. Not to mention the service would need to be breached for hashes first.

[–] [email protected] 1 points 1 year ago (1 children)

Yeah imagine saying 69000 years is only 3/5 secure

[–] [email protected] 1 points 1 year ago

Everytime I see this graph I focus on the fact that 1 second and 10 months are the same color, but 1 sec and "instant" are different colors.

Like I guess if "instant" is a billionth of a second than it's a greater difference of magnitudes. However, in reality a second feels like an instant.