I have quibbles with their methodology. Their computer already has the password they submit and a separate program has to guess what it is. By brute force. Try something then try the next.
The problem is that in the real world they don't know what the password is. They have to test the trials against a remote or a website. Common practice is to make the verification deliberately slow. Enforcing a one second turnaround time means it takes a full second to know if they got a hit. This lengthens the time to crack it enormously. A 2 second delay doubles the time again. An enormous time overhead over which the attacking computer has no control. To get a true picture they need to test against a real (slow!) verification process outside their control. Even the simplest passwords would take days to crack no matter how fast their computers were. I think their chart is wildly inaccurate. What am I missing here? On Wednesday, April 19, 2023 at 2:32:29 AM UTC-5 [email protected] wrote: > I'm interested in learning more about this: > > > > https://www.reddit.com/r/coolguides/comments/12qmk1r/i_updated_our_famous_password_table_for_2023/ > > -- -- You received this message because you are subscribed to the Google Groups "NLUG" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/nlug-talk?hl=en --- You received this message because you are subscribed to the Google Groups "NLUG" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/nlug-talk/6ec21391-b2e6-473e-9721-a2ebae1e5567n%40googlegroups.com.
