If you send it to me, I’ll gladly tell you that you shouldn’t bother your pretty little head about it.
> Could anybody translate Owen’s message into ordinary language? Or shouldn’t I bother my pretty little head about it.
>
> Meanwhile, this morning, I got an urgent message from an acquaintance asking me to loan him 2500 dollars on account of his being robbed “at gunpoint” in the Philippines. A call to his home revealed that he was safe and sound in Denver. Here is the puzzle. The spoofer gave me nowhere to send my money. Thus, I have 2500 dollars to send and nowhere to send it. The only way I had of getting back to him/her was via the spoofed email address. No link. No bank account number. No phone number in Manila. How does THAT work?
>
> Nick
>
>
> Nicholas S. Thompson
> Emeritus Professor of Psychology and Biology
> Clark University
>
http://home.earthlink.net/~nickthompson/naturaldesigns/>
> From: Friam [mailto:
[hidden email]] On Behalf Of Owen Densmore
> Sent: Monday, November 18, 2013 10:13 AM
> To: Complexity Coffee Group
> Subject: [FRIAM] Forum hacked
>
> A forum I belong to has been hacked, including personal info as well as passwords.
>
> How do they use this information?
>
> I presume they try the hash function on all combinations of possible passwords. (Naturally optimized for faster convergence). They see a match, i.e. a letter combination resulting in the given hash of the password.
>
> If they crack one password, does that make cracking the rest any easier?
>
> And does "salt" simply increase the difficulty, and indeed can it be deduced, as above, by cracking a single password?
>
> .. or is it all quite different from this!
>
> -- Owen
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> to unsubscribe
http://redfish.com/mailman/listinfo/friam_redfish.comMeets Fridays 9a-11:30 at cafe at St. John's College