"@bl4ckt0ts: hetzner got hacked: http://wiki.hetzner.de/index.php/Security_Issue/en … and http://pastebin.com/WfhEtmRS " ouch.. and more weak password hashes exposed...
@floodyberry @veorq also, you don't include the salt size in the 9 chars, which we don't know and could be arbitrary characters
-
-
@delroth_@floodyberry the salt size or its character sets is not important -
@veorq@floodyberry it completely kills the ability to perform efficient parallel hash computations
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.