On Thu 24 Aug 2017 at 18:42:47 (+0100), Brian wrote:
> On Wed 23 Aug 2017 at 18:06:49 -0500, Mario Castelán Castro wrote:
> > On 23/08/17 14:11, Brian wrote:

> > > "Probably" is probably good enough. The probability of either of the two
> > > previous passwords being deduced from pure guessing is close to zero.
> >
> > It is not human guessing, but brute force attacks with specialized
> > hardware what you should try to protect against.

[...]

> > Anyway, you have to take into account that sometimes a data base of
> > hashed passwords of the users can be  obtained through normal cracking.
> > Then the attacker can perform a brute force search without any further
> > need for network access.
> > 
> > If your ~/.gnupg directory leaks, then your OpenPGP key is protected
> > only by your password. No network access is required after the initial leak.
> 
> I'll give you that. 50,000 tests per second offline (or whatever it is
> now) beats an online attack of a few hundred (?) per second any day of
> the week.
> 
> I've seen it said that a memorable password is a weak password. Perhaps
> there is some truth in that, but (again IME) it needn't be so.

Unless you have accounts¹ that invite break-in attempts², the main
thing to resist offline cracking is to have better passwords than
your neighbours, just like security against burglary. Once a suitable
proportion of passwords have been cracked, which will consist of the
easier ones, there are diminishing returns in continuing to try to
crack the rest.

¹accounts of all sorts, not just forums.
²institutions, slebs, politicians, etc.

Cheers,
David.

Reply via email to