Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What about the other case - when they're not random, but also not reused ... such that the psychology of the user's password-selection methodology might be exposed?


If you have a password selection methodology that you do not change when hashed passwords are compromised, then it doesn't help you. The methodology will be uncovered once the password is cracked, even if that specific password doesn't itself work anywhere anymore. It's somewhat better if the methodology is discovered later than earlier, I suppose.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: