Thread 105817042 - /g/ [Archived: 464 hours ago]

Anonymous
7/6/2025, 3:12:47 PM No.105817042
standards
standards
md5: d07187f161428d0e0c1bce6623017427🔍
Why is technology like this
Replies: >>105817071 >>105817099 >>105817323 >>105817339 >>105818821 >>105819326 >>105819401
Anonymous
7/6/2025, 3:15:53 PM No.105817071
>>105817042 (OP)
Because gayland trannies couldn't just sit still and let the man handle the X11 to X12 upgrade.
Anonymous
7/6/2025, 3:20:56 PM No.105817099
>>105817042 (OP)
competition exists within technology
Anonymous
7/6/2025, 4:04:44 PM No.105817323
>>105817042 (OP)
Literally and unitonically, autism
If it isn't perfect we have to make it again from scratch
Anonymous
7/6/2025, 4:07:29 PM No.105817339
>>105817042 (OP)
> see shit comics written by retards that know nothing about computers
> know instantly op makes the most retarded street shitters in india look like nuclear physicists
fuck off and die.
Replies: >>105817379
Anonymous
7/6/2025, 4:10:19 PM No.105817358
and within those standards there are constant upgrades and changes. oh you use hdmi? well is it hdmi 2? 2.1? 2.1b? Bro you're still on wifi 6? wifi 7 is the new hotness.

DDR5 isnt even the main ram yet and DDR6 is about to come out
Anonymous
7/6/2025, 4:12:38 PM No.105817379
>>105817339
That specific retard knows a lot about computers, actually
Replies: >>105817401
Anonymous
7/6/2025, 4:13:58 PM No.105817393
1653586086431
1653586086431
md5: ee5042de7a53baf10725754f693aa0ee🔍
>usb-c with usb 2.0 wiring
Anonymous
7/6/2025, 4:14:56 PM No.105817401
>>105817379
and negros tongue my anus. these are the same retards that made the password comic, made big brain observation of entropy and decided 'weeew.. let's pretend dictionary attacks don't exist', and then everyone shit on them on their own website. absolute geniuses. fuck off, retard.
Replies: >>105817432 >>105817840
Anonymous
7/6/2025, 4:18:47 PM No.105817432
1740392450612771
1740392450612771
md5: e43748868fd7c041dbd2668e967fc94e🔍
>>105817401
This is your issue? It explicitly assumes a dictionary attack, the strength of the password comes from there being >2^40 passwords you can make with 4 random common words
Replies: >>105819389 >>105819396
Anonymous
7/6/2025, 4:44:01 PM No.105817607
Definitely USB-C.
Anonymous
7/6/2025, 5:10:43 PM No.105817840
>>105817401
>he got filtered by battery staple
you are officially dumber than the xkcd guy and that is fucking horrifying
fixLIVES !!wuJ3PawAFy9
7/6/2025, 6:57:42 PM No.105818821
why is the Internet like this
why is the Internet like this
md5: 3eb2b6c2bf081a94cf83d5ef203aef12🔍
>>105817042 (OP)
Anonymous
7/6/2025, 7:52:49 PM No.105819326
>>105817042 (OP)
Sad to see how much of a pozzed Redditor Randall Munroe, aka xkcd, has become over the years.
Anonymous
7/6/2025, 8:00:42 PM No.105819389
>>105817432
I ain't a security fag, but I'm pretty sure crackers are able to use combinators. Instead of thinking of it like "bits of entropy" like this fag, it'd be better to call it "blocks of bits of entropy". Both of those passwords would be relatively easy to crack if the proper tools were used, but that's the trick isn't it? So while the idea is somewhat correct it fails to account for obvious flaws. It'd still be better to throw in some random characters, uncommon words and just keep the longer passphrase.

plus that comic is for fags anyways. pedantic piece of shit that doesn't know what he's talking about. could have spent 10 seconds on google like I did to see what brute force programs can do.
Replies: >>105819399 >>105819419 >>105820325 >>105820626
Anonymous
7/6/2025, 8:02:07 PM No.105819396
>>105817432
add a number there and there and you're good to go
Anonymous
7/6/2025, 8:02:28 PM No.105819399
>>105819389
>I ain't a security fag
That's very clear.
The entire rest of your post is entirely wrong and completely retarded, by the way.
Replies: >>105819453
Anonymous
7/6/2025, 8:02:40 PM No.105819401
>>105817042 (OP)
It's not, most standards are bad or obsolete.
Anonymous
7/6/2025, 8:05:24 PM No.105819419
>>105819389
>it'd be better to call it "blocks of bits of entropy".
No it wouldn't
>Both of those passwords would be relatively easy to crack if the proper tools were used
No they wouldn't be
>but that's the trick isn't it?
No it's not
>it fails to account for obvious flaws
No it doesn't
>It'd still be better to throw in some random characters, uncommon words and just keep the longer passphrase
A longer password with more random shit in it is always going to be "better" but it's completely unnecessary in this case. You'd just be making the password harder to remember for no reason.
>could have spent 10 seconds on google like I did to see what brute force programs can do
Yeah, getting shallow information about something you clearly don't understand at all would also lead other people to the wrong conclusions, just like it did with you. Maybe shut the fuck up when you don't have the slightest clue what you're talking about.
Replies: >>105819453
Anonymous
7/6/2025, 8:08:07 PM No.105819445
mozilla
mozilla
md5: e3cf15aba3d3a3e9d19ca7b126e3311f🔍
Why is mozilla like this
Anonymous
7/6/2025, 8:08:38 PM No.105819453
>>105819399
>>105819419
no ur a fag and I'm right
Anonymous
7/6/2025, 9:51:51 PM No.105820325
>>105819389
Anon, you're retarded

If you use a list of the 1000 most common words, and pick 4 of them at random, then the attacker has a 1/1000 chance of guessing that word. Let's say 1024 instead of 1000, which is a nice round 2^10. That's what 10 bits of entropy means, the attacker has to find the correct word out of 2^10 possible words

Now if you choose for words, the attacker has to guess all of them. That's (1/1024) * (1/1024) * (1/1024) * (1/1024), or (2^10)^4, or 2^40. The attacker has to choose the correct combination out of 2^40 possible combinations, that's what 40 bits of entropy means

This is a dictionary attack, where the attacker knows exactly which list of words you are using. This is the WORST possible scenario for you. If the attacker uses a larger list of words than you, or goes for a bruteforce attack without a dictionary, the difficulty is tens of orders of magnitude harder
Anonymous
7/6/2025, 10:13:30 PM No.105820519
Surely someone has tested this instead of arguing about it
Replies: >>105820563
Anonymous
7/6/2025, 10:18:29 PM No.105820563
>>105820519
Test what? That probabilies work the way math says they do? Or tested dictionary attacks on passwords with 40 bits of entropy on their own home computer?
Anonymous
7/6/2025, 10:25:00 PM No.105820626
e53aafa53af67a2ebc9fc112e63d8ba9s
e53aafa53af67a2ebc9fc112e63d8ba9s
md5: 3f6cc9a8d3a9fbbae110b991d5cd2d4b🔍
>>105819389
Angrily assuming something you don't know about is the same as running in the dark

The 44 bits of entropy comes from a 2048-bit wordlist (11 bits for each word), it's already taking dictionary attacks in consideration
"correct horse battery stable" bruteforce entropy is much higher, like around 132 bits if considering [a-z] and space
Anonymous
7/7/2025, 2:20:12 AM No.105822516
Competition drives innovation.