In other words, what matters most is what characters EVERYONE in the system uses, not just you. What matters most is what the attacker expects to have to tried, not what characters you chose. On the issue of characters used in a password, this is not quite as simple as most people state. It might take longer, due to the speed of the USB connection, but human typing rate is not a good reference on this matter. Even if you can't get to the HDD, the attacker would simply replace the keyboard with a computer that would send 'keystrokes' much faster than you could type. And frankly, that is easy to do, if you have access to the computer itself. But that assumes the attacker has access to the file that stores the encrypted password. In that case, an 8 digit password would be blown in less than 6 hours sooner depending on the brute-force method. I know of one modest demonstration (Feb 2012, link) that claimed the power to make 400 billion guesses a second on a 25 GPU system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |