Could anybody translate Owen's message into ordinary language?   Or
shouldn't I bother my pretty little head about it. 

 

Meanwhile, this morning, I got an urgent message from an acquaintance asking
me to loan him 2500 dollars on account of his being robbed "at gunpoint" in
the Philippines.   A call to his home revealed that he was safe and sound in
Denver.  Here is the puzzle.  The spoofer gave me nowhere to send my money.
Thus, I have 2500 dollars to send and nowhere to send it.  The only way I
had of getting back to him/her was via the spoofed email address.  No link.
No bank account number.  No phone number in Manila.  How does THAT work?  

 

Nick 

 

 

Nicholas S. Thompson

Emeritus Professor of Psychology and Biology

Clark University

http://home.earthlink.net/~nickthompson/naturaldesigns/

 

From: Friam [mailto:[email protected]] On Behalf Of Owen Densmore
Sent: Monday, November 18, 2013 10:13 AM
To: Complexity Coffee Group
Subject: [FRIAM] Forum hacked

 

A forum I belong to has been hacked, including personal info as well as
passwords.

 

How do they use this information?

 

I presume they try the hash function on all combinations of possible
passwords.  (Naturally optimized for faster convergence).  They see a match,
i.e. a letter combination resulting in the given hash of the password.

 

If they crack one password, does that make cracking the rest any easier?

 

And does "salt" simply increase the difficulty, and indeed can it be
deduced, as above, by cracking a single password?

 

.. or is it all quite different from this!

 

   -- Owen

============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to