And then some script kiddie from 4chan with a GPU outs all the plaintexts, and/or sets up a Twitter bot to automate it. Be very, very careful with ad-hoc security "protocols" like this. Especially when your livelihood may be at stake.https://twitter.com/Dharlette/status/944183293653733376 …
I dunno, ask the OP, she seems to think it's not a problem and not worth discussing, considering, or making clear to those using this scheme.
-
-
So you just assume that a bunch of women in the security industry have no idea what they are doing, while its quite obvious, and you can't understand why they are not interested in you explaining obvious stuff to them? Should I further explain why?
-
I conclude that *one* woman (who is a biologist) is clearly not aware of the tradeoffs in the design of this purported hash-based protocol and also doesn't seem to be interested in discussing it before blindly giving advice to others.
- Show replies
New conversation -
-
-
Protip; outing sexual predators is not a threat, its the point. If smbd decrypts the hash it ain't them making the accusations public. WTF do you expect them to do with salts if they are looking for people who are only connected to them by a "shared secret" which they use....
-
Pro tip: if A posts a hash of B's name and C cracks it, C isn't going to get the blame and media attention for incriminating B. A is.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.