password hashing explained
Richard O'Neill
richardoneill at earthlink.net
Fri Jun 10 10:03:29 CDT 2016
But then there's this.
https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/
http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu
"My passwords are all cryptographically strong random strings of at
least 20 characters (unless the application won't allow that); they are
all generated by machine (I never see them so you can't torture them out
of me); none of them are re-used, ever; and they are stored in a heavily
encrypted file that only exposes one password at a time on demand for a
short span of time. "
More information about the Tacos
mailing list