![]() |
2010-01-19
, 18:23
|
Posts: 2,802 |
Thanked: 4,491 times |
Joined on Nov 2007
|
#131
|
The Following User Says Thank You to lma For This Useful Post: | ||
![]() |
2010-01-19
, 23:11
|
Posts: 98 |
Thanked: 31 times |
Joined on Nov 2009
|
#132
|
@mahousaru
Again, we have people that understand security trying to explain it to people that don't understand it, and probably don't really care to. What people do care about is feeling secure. These are two different things, and I responded to the latter. And so did you.
The Following User Says Thank You to mahousaru For This Useful Post: | ||
![]() |
2010-01-20
, 12:08
|
|
Posts: 2,050 |
Thanked: 1,425 times |
Joined on Dec 2009
@ Bucharest
|
#133
|
![]() |
2010-01-20
, 13:17
|
|
Posts: 2,535 |
Thanked: 6,681 times |
Joined on Mar 2008
@ UK
|
#134
|
And no, an one-liner is not enough security. There has to be something that is not one-liner in the terminal. A modified ROT13 would be just fine, thanks. ROT15? Don't know. But there is no ROT15 implemented in any language, you need to write one and that takes a minute on the N900 kbd.
tr 'A-Z' 'P-ZA-O' .rtcom-accounts/accounts.cfg
tr 'P-ZA-O' 'A-Z' .rtcom-accounts/accounts.cfg
I have the time to see him typing furiously in the terminal and look over the shoulder.
Also, it's not immediately obvious that it's a ROT15 and not ROT16 or similar, making the scanning source harder to write.
The Following 3 Users Say Thank You to Jaffa For This Useful Post: | ||
![]() |
2010-01-20
, 14:05
|
|
Posts: 2,121 |
Thanked: 1,540 times |
Joined on Mar 2008
@ Oxford, UK
|
#135
|
The Following 4 Users Say Thank You to pelago For This Useful Post: | ||
![]() |
2010-01-25
, 22:01
|
|
Posts: 963 |
Thanked: 626 times |
Joined on Sep 2009
@ Connecticut, USA
|
#136
|
This talk of how long it would take for an attacker to type in a script is misleading. All the attacker needs to do is to take a copy of the file (e.g. email it to themselves, or copy and paste it into pastebin), then they can decode the passwords at their leisure later on. So it doesn't matter how much you obfuscate the password, it might as well be plain text.
![]() |
2010-01-25
, 23:20
|
Posts: 98 |
Thanked: 31 times |
Joined on Nov 2009
|
#137
|
This talk of how long it would take for an attacker to type in a script is misleading. All the attacker needs to do is to take a copy of the file (e.g. email it to themselves, or copy and paste it into pastebin), then they can decode the passwords at their leisure later on. So it doesn't matter how much you obfuscate the password, it might as well be plain text.
![]() |
2010-03-22
, 18:29
|
Posts: 53 |
Thanked: 12 times |
Joined on Mar 2010
|
#138
|
![]() |
2010-06-02
, 09:56
|
|
Administrator |
Posts: 1,036 |
Thanked: 2,019 times |
Joined on Sep 2009
@ Germany
|
#139
|
![]() |
2010-06-02
, 11:45
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#140
|
![]() |
Tags |
conversations, debate, email, fremantle, instant message, instant messaging, maemo, maemo 5, modest, password, passwords, plain text, security, telepathy |
Thread Tools | |
|