New FAQ items
Kristian Fiskerstrand
kristian.fiskerstrand at sumptuouscapital.com
Tue Dec 1 22:00:29 CET 2015
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 12/01/2015 10:01 PM, Robert J. Hansen wrote:
>> Would a reference to nasty[0] or other tools to aid such
>> brute-force attacks be useful in this context?
>
> I thought about it but decided against it. I've never heard of
> someone successfully using nasty to recover their passphrase. I
> hate to recommend a tool where I can't point to a single user who's
> had a good experience with it.
I've hard of a few users with good experiences using it, but it has
always been in the context of rotation of several known password
string using separators and number paddings etc so they have been able
to build a good pattern to base it on
- --
- ----------------------------
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- ----------------------------
Donec eris sospes, multos numerabis amicos.
Tempora si fuerint nubila, solus eris.
As long as you are wealthy,you will have many friends.
When the tough times come, you will be left alone
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCgAGBQJWXgpoAAoJECULev7WN52FX4wH/0yE7XgBLbF4TKWBBxYR0Gv6
mgYtqSq7/3cmXWkUmw2Oz5me63T9NKyA/j+KeTdWoOskryCDvU46X5I3OVf26lkV
4hFQl0rS5qMT3vtyK7wu8W53Ry6JcBIOhbjk2nQ3zCcVhMYEZBlxPCVcCI0KDorD
7H8C+tBpmsqLhHHP3RzDWQWkdNfFsSbJda+0Gvemt9hE52COCKEp0HqM42c4Grwp
t2UOqq2yL4Wq6bWtKZbp3OS6+NCrkYyOA5lb5UOFVypCTIkj7isskhSPSufzoe6L
Hf+YnJM8hKbv/r+4B/yRts/Uf64uKEgq3czkO9NEof9RxUbXhoN7CBkKjfdnjIU=
=nozz
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list