"@bl4ckt0ts: hetzner got hacked: http://wiki.hetzner.de/index.php/Security_Issue/en … and http://pastebin.com/WfhEtmRS " ouch.. and more weak password hashes exposed...
@veorq could definitely be better, but still, that's better than plaintext/unsalted md5 and likely to be secure for a few years
-
-
@delroth_@veorq http://hashcat.net/oclhashcat-plus/ … 1 billion hashes/sec with a single 7970/6990. A few days for anything 9 characters, at most -
@floodyberry@veorq also, you don't include the salt size in the 9 chars, which we don't know and could be arbitrary characters - 2 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.