And then some script kiddie from 4chan with a GPU outs all the plaintexts, and/or sets up a Twitter bot to automate it. Be very, very careful with ad-hoc security "protocols" like this. Especially when your livelihood may be at stake.https://twitter.com/Dharlette/status/944183293653733376 …
I conclude that *one* woman (who is a biologist) is clearly not aware of the tradeoffs in the design of this purported hash-based protocol and also doesn't seem to be interested in discussing it before blindly giving advice to others.
-
-
Have you checked how many brilliant men stepped up to inform her of that, or did you not bother? I'd love to see you guys being so active targeting predators as you are paternalising their victims.
-
Half of those "brilliant" men were conflating concepts like rainbow tables that are tangential and not offering any practical advice on how to improve the protocol or how to evaluate it. I tried to do the latter.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.