password hashing explained

Richard O'Neill richardoneill at earthlink.net
Fri Jun 10 10:03:29 CDT 2016


  But then there's this.

https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/

http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu



"My passwords are all cryptographically strong random strings of at 
least 20 characters (unless the application won't allow that); they are 
all generated by machine (I never see them so you can't torture them out 
of me); none of them are re-used, ever; and they are stored in a heavily 
encrypted file that only exposes one password at a time on demand for a 
short span of time. "


More information about the Tacos mailing list