Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It does technically scale, just like everything else :)

But I think the parent's point was that this compute time only lets you check one password against one account. All you can do, after this compute time, is state that "'monkey' is/ is not the correct password for @iagooar's account".

Those results can't be used to check other accounts (because they're salted) so this approach doesn't really scale well at all. It might, for a huge adversary (state-scale) allow a single password to be cracked in a reasonable timeframe, iff it's relatively simple password.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: