Hey all you "never do cryptography yourself" people, here's _yet more_ proof you've been wrong the whole time: http://www.reuters.com/article/2014/03/31/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331?feedType=RSS&feedName=topNews&utm_source=dlvr.it&utm_medium=twitter&dlvrit=992637 …
-
-
Replying to @dotstdy
@dotstdy@andmatand@Jonathan_Blow Password storage is an extremely difficult and not widely discussed problem!1 reply 0 retweets 0 likes -
Replying to @cmuratori
@dotstdy@andmatand@Jonathan_Blow I do like SCrypt but it's unclear how useful it is CPU-only, and it's such a pain to go GPU :(1 reply 0 retweets 0 likes -
Replying to @cmuratori
@dotstdy@andmatand@Jonathan_Blow Plus I'm not sure how much of a win it can really be because you can't go wide, really.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@dotstdy@andmatand@Jonathan_Blow That's the problem you always run into - the attackers can go wide, and you can't.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@dotstdy@andmatand@Jonathan_Blow Actually no, now that I remember, I guess with SCrypt you can go wide. So that's good.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@dotstdy@andmatand@Jonathan_Blow At least I _think_ you could - assuming you could treat each lane as a "thread" in SCrypt parlance.1 reply 0 retweets 0 likes
@dotstdy @andmatand @Jonathan_Blow (in case you can't tell, it's been a long time since I've looked at SCrypt)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.