Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days ago60% of MD5 password hashes are crackable in under an hourwww.theregister.comexternal-linkmessage-square35linkfedilinkarrow-up1159arrow-down16cross-posted to: privacy@lemmy.dbzer0.com
arrow-up1153arrow-down1external-link60% of MD5 password hashes are crackable in under an hourwww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square35linkfedilinkcross-posted to: privacy@lemmy.dbzer0.com
minus-squarenimpnin@sopuli.xyzlinkfedilinkEnglisharrow-up2·2 days agoI don’t think that means it cannot be leaked
minus-squareUndercoverUlrikHD@programming.devlinkfedilinkEnglisharrow-up1·2 days agoYeah, but what would you do with it? Can you convert the bytes to work on any other sensor the victim may also use their fingerprint? Never looked into the real implementation details of the fingerprint hardware.
minus-squareNatanael@slrpnk.netlinkfedilinkEnglisharrow-up1·2 days agoSometimes you can. Or just bruteforce a colliding pattern that matches to print that instead, because why not
I don’t think that means it cannot be leaked
Yeah, but what would you do with it? Can you convert the bytes to work on any other sensor the victim may also use their fingerprint? Never looked into the real implementation details of the fingerprint hardware.
Sometimes you can. Or just bruteforce a colliding pattern that matches to print that instead, because why not