Could anybody translate Owen’s message into ordinary language? Or shouldn’t I bother my pretty little head about it.
Meanwhile, this morning, I got an urgent message from an acquaintance asking me to loan him 2500 dollars on account of his being robbed “at gunpoint” in the Philippines. A call to his home revealed that he was safe and sound in Denver. Here is the puzzle. The spoofer gave me nowhere to send my money. Thus, I have 2500 dollars to send and nowhere to send it. The only way I had of getting back to him/her was via the spoofed email address. No link. No bank account number. No phone number in Manila. How does THAT work?
Nick
Nicholas S. Thompson
Emeritus Professor of Psychology and Biology
Clark University
http://home.earthlink.net/~nickthompson/naturaldesigns/
From: Friam [mailto:[hidden email]] On Behalf Of Owen Densmore
Sent: Monday, November 18, 2013 10:13 AM
To: Complexity Coffee Group
Subject: [FRIAM] Forum hacked
A forum I belong to has been hacked, including personal info as well as passwords.
How do they use this information?
I presume they try the hash function on all combinations of possible passwords. (Naturally optimized for faster convergence). They see a match, i.e. a letter combination resulting in the given hash of the password.
If they crack one password, does that make cracking the rest any easier?
And does "salt" simply increase the difficulty, and indeed can it be deduced, as above, by cracking a single password?
.. or is it all quite different from this!
-- Owen
Free forum by Nabble | Edit this page |