Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
robryk
on May 6, 2014
|
parent
|
context
|
favorite
| on:
We'd lose our security certificate if we allowed p...
Even if they do, acquiring both of these hashes vastly helps with brute-forcing: you first break the phone key password and then check only the alphanumeric passwords that match it against the alphanumeric password's hash.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: