TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

LastPass breach: The significance of these password iterations

47 点作者 hjuutilainen超过 2 年前

6 条评论

AdmiralAsshat超过 2 年前
As I feared, I changed the iterations myself at some point, and they never &quot;migrated&quot; it to the new value. So it&#x27;s above the old default, but well below the recommended number of iterations.<p>I don&#x27;t suppose it being a non-obvious value makes it any more secure? Is an attacker brute forcing the thing likely to try obvious default values first and then give up if they don&#x27;t work? Or will they simply +1 the iteration count until they hit paydirt?
评论 #34170567 未加载
评论 #34167749 未加载
postpawl超过 2 年前
For anyone else having trouble finding the “show advanced settings” button: It’s at the bottom of the account settings pop up where ok&#x2F;cancel buttons usually are.
foreverCarlos超过 2 年前
Interesting. This is starting to look like gross negligence that might bite LogMeIn really hard.
stubish超过 2 年前
Can attackers can easily tell the 1 and 500 iteration databases and focus their resources in breaching those ones?
评论 #34170603 未加载
Havoc超过 2 年前
&gt;GTX 1080 Ti graphics card (cost factor: less than $1000) can be used to test 346,000 guesses per second.<p>&gt;GeForce RTX 4090 graphics card could test more than 88,000 guesses per second!<p>Guessing we&#x27;re missing a zero there?
评论 #34170583 未加载
smoothgrammer超过 2 年前
The article is missing key data. The password iterations that are set low are client side. The server side is different.<p>The writer of the article needs to retract.<p><a href="https:&#x2F;&#x2F;support.lastpass.com&#x2F;help&#x2F;about-password-iterations-lp030027" rel="nofollow">https:&#x2F;&#x2F;support.lastpass.com&#x2F;help&#x2F;about-password-iterations-...</a>
评论 #34170595 未加载