TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

You can not lose your private key, if you drop it first

2 点作者 imcotton9 个月前

2 条评论

BobbyTables29 个月前
What rubbish is this?<p>Does the author not understand entropy or probability?<p>Deriving an RSA key from the product of two memorizable numbers makes it brute-force-able, and sends us back to 1990s export controlled encryption strength.<p>Tattoo-ing a key on one’s arm (however ridiculous) would be better than the methods here.
评论 #41263047 未加载
评论 #41263368 未加载
imcotton9 个月前
In case one not digging into the source code, the key stretching here is PBKDF2-HMAC-SHA512 with 400,000 iterations (OWASP recommended 210,000).<p>The reason for not using Argon2 or scrypt is because PBKDF2 is native provide by Webcrypto yet FIPS-140 compliance.