I have quibbles with their methodology.  Their computer already has the 
password they submit and a separate program has to guess what it is.  By 
brute force.  Try something then try the next.

The problem is that in the real world they don't know what the password 
is.  They have to test the trials against a remote or a website.  Common 
practice is to make the verification deliberately slow. Enforcing a one 
second turnaround time means it takes a full second to know if they got a 
hit.  This lengthens the time to crack it enormously.  A 2 second delay 
doubles the time again.  An enormous time overhead over which the attacking 
computer has no control.

To get a true picture they need to test against a real (slow!) verification 
process outside their control.  Even the simplest passwords would take days 
to crack no matter how fast their computers were. I think their chart is 
wildly inaccurate.

What am I missing here?
On Wednesday, April 19, 2023 at 2:32:29 AM UTC-5 [email protected] wrote:

> I'm interested in learning more about this:
>
>
>
> https://www.reddit.com/r/coolguides/comments/12qmk1r/i_updated_our_famous_password_table_for_2023/
>  
>

-- 
-- 
You received this message because you are subscribed to the Google Groups 
"NLUG" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/nlug-talk?hl=en

--- 
You received this message because you are subscribed to the Google Groups 
"NLUG" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/nlug-talk/6ec21391-b2e6-473e-9721-a2ebae1e5567n%40googlegroups.com.

Reply via email to