[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH-PCH6v3CStTKxK+fnnPDFtMqi147UQsZJaGJuK5ChT4o-sLg@mail.gmail.com>
Date: Fri, 2 Dec 2011 23:08:14 +0100
From: Ferenc Kovacs <tyra3l@...il.com>
To: Charles Morris <cmorris@...odu.edu>
Cc: full-disclosure@...ts.grok.org.uk, Valdis.Kletnieks@...edu
Subject: Re: Large password list
On Fri, Dec 2, 2011 at 10:26 PM, Charles Morris <cmorris@...odu.edu> wrote:
> Valdis,
>
> > (For real fun, consider that published and unpublished works are treated
> differently. And
> > a password list almost always becomes a published work without the
> permission of
> > the author(s) ;)
>
> Talking of currently implemented systems...
>
> One could argue that the author of lists resulting from cracked hashes
> is the cracker,
> as the cracker is simply computing one of the infinite collisions that
> each hash intrinsically has.
>
>
on a related note:
http://en.wikipedia.org/wiki/Illegal_number
http://en.wikipedia.org/wiki/Illegal_prime
--
Ferenc Kovács
@Tyr43l - http://tyrael.hu
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists