Phewstepsaway 🌹 · @phewstepsaway
185 followers · 1227 posts · Server shakedown.social

This one, like last time, skip to the jam please

#kdf #phish #jamdevilfalls

Last updated 1 year ago

halbwach · @halbwach
54 followers · 2020 posts · Server wandzeitung.xyz

Guten Morgen,
🌡️22°C 🌤️
Auch schon mal den Kofferraum an der falschen Stelle gesucht?

Heute vor 20 Jahren lief der letzte in vom Band.
Ursprünglich in der Nazizeit als Wagen von Ferdinand geplant wurde durch die Briten nach Kriegsende die Produktion des VW Typ1 in Wolfsburg forciert.
Bereits 7 Jahre zuvor nannte die den kleinen "beetle".
Populär wurde er hauptsaechlich durch seine sparsame Bauweise, weiss das zu berichten.

#kalenderblatt #nytimes #porsche #kdf #mexico #kafer #vw

Last updated 1 year ago

Phewstepsaway 🌹 · @phewstepsaway
183 followers · 1061 posts · Server shakedown.social

Yup, this is gas.

#kdf

Last updated 1 year ago

· @linkdrop
56 followers · 1952 posts · Server botsin.space
Leonard/Janis Robert König · @ljrk
443 followers · 16626 posts · Server todon.eu

High @sc00bz and @epixoip, I recently came across your recommendations not to (blindly) use as a (but it's a good ) due to this requiring runtimes that make it (usually) inapplicable for password hashing. Or, phrased differently, would require lowering security parameters in order to stay performant, that the security of the hashing would be compromised.

The article on Wikipedia put forth a similar claim but without any citations and phrased a bit misleading (IMO). I've adjusted the article and added two citations. If you have time, I'd be glad if you could give some feedback on this, as there are only few citable sources on this and I'm by far no expert on the matter:

en.wikipedia.org/w/index.php?t

Thank you!

#argon2 #phf #kdf #bcrypt

Last updated 1 year ago

v_i_o_l_a · @v_i_o_l_a
848 followers · 4164 posts · Server openbiblio.social

adieu, christian! möge es Dir gutgehen, wo auch immer Du jetzt bist. 🖤

#kdf

Last updated 1 year ago

Sekundenbindung · @stubenhocker
38 followers · 2972 posts · Server troet.cafe

#kdf

Last updated 1 year ago

Cathy Colliver · @cathycolliver
73 followers · 58 posts · Server mastodon.world

Little Man 1 is going on an Orchestra/Band trip to Chicago this weekend. So I told him he should take a Pegasus Pin for Derby spirit.

I unpeeled the envelope and saw a gold Pegasus Pin for the first time ever in the wild.

Winner = you can register for a special grand prize drawing. No more instant winners like the 20th century era.

#louisville #kentuckyderby #kentucky #kdf

Last updated 1 year ago

Keywan Tonekaboni · @ktn
523 followers · 72 posts · Server social.heise.de
Hélder Ferreira · @hferreira
0 followers · 51 posts · Server masto.pt

O Bitwarden está a um passo de finalizar a implementação do KDF, Argon2.
Foram englobados no código os últimos dois Pull-requests.

#bitwarden #kdf #algorithm #security #argon2 #opensource

Last updated 2 years ago

Lord Winni Neessen :verified: · @winni
43 followers · 76 posts · Server s.pebcak.de

@epixoip btw. uses the same but has the advantage of self-hosting. So a breach to Bitwardens infrastructure would not leak self-hosted instances.

#bitwarden #kdf

Last updated 2 years ago

Jeremi M Gosney :verified: · @epixoip
2975 followers · 131 posts · Server infosec.exchange

Many of you have been asking for my thoughts on the breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a cracker's perspective!

Your vault is encrypted with using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celebs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to or , change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!

#lastpass #password #aes256 #pbkdf2 #kdf #hashcat #bitwarden #1password

Last updated 2 years ago

【1933年11月27日】歓喜力行団(Kraft durch Freude、略称 KdF)が設立される。






#11月27日 #1933年11月27日 #kdf #Kraft_durch_Freude #歓喜力行団 #今日は何の日

Last updated 2 years ago

RT @MatthiasMeisner@twitter.com

Der hält für einen Kabarettisten und Satiriker. Für jeden erkennbar ist seine Sympathie mit Rechtsradikalen. Der Sender sieht nicht einmal Anlass für einen Tadel. twitter.com/mdrpresse/status/1

#mdr #steimle #kdf

Last updated 5 years ago