lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040320172624.GA24278@hockwold.net> From: warlock at eskimo.com (Jim Richardson) Subject: Re: pgp passphrase On Sat, Mar 20, 2004 at 05:30:52PM +0530, Aditya, ALD [Aditya Lalit Deshmukh] wrote: >> >> >> Key won't do them much good if they don't have my passphrase :) > >cant the key be bruteforced in some kind of distributed fashion ? like >spam sending bot we could also have key brute forcing bots .... > dunno, I'd be willing to listen to evidence that it could, but put it pretty low down on the list of things to worry about. -- Jim Richardson http://www.eskimo.com/~warlock When the DM smiles, it's already too late. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040320/b9e0533c/attachment.bin
Powered by blists - more mailing lists