dko1905
The article is almost 70 days old, and Clemens Fruhwirth, one of the creators of LUKS, has responded:
A random keyboard typable character gives you around 6 bits of entropy. 20 of those give you 120 bits of entropy. Even without a KDF, brute-forcing this key space is infeasible with today's hardware. Even with PBKDF2, a 13-character password should be enough to keep your data secure for your lifetime.[1]
It is much more likely that there was some security failure in the linked case other than PBKDF2. That said, I support the upgrade to Argon2.
[1] In my thesis on LUKS, Chapter 5.3 Passwords from entropy weak sources anticipates the creation of specialized hardware for breaking PBKDF2. The "13 characters should be enough" advice is found on Page 86, Table 5.4, top left cell. It gives a 78-bit recommendation (=13 characters) in the worst-case scenario, which is Moore's law continues to double the attacker speed every 2 years.
It doesn't seem like it's such a big deal.
Any reason tchncs.de is on the 'do not use' list? What exactly does 'morg 3.0' mean?
Wonderful
DDG all the way
Seems quite good. Although I'm having some trouble with connecting to some instances (e.g. feddit.dk) Edit: Everything seems to work now (2023-06-17)
Garry's mod. Doesn't use a lot of resources (compared to newer games like Satisfactory), and you have an almost unlimited amount of content and things to do because of the Community Workshop.