From /r/fedora over on reddit logo

  • ShiningWing@lemmygrad.mlOP
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    “Just” throw every key at it? Isn’t that just a typical brute-force attack? That’s hardly what I’d call an “easy crack”, it’s why I said it isn’t realistic for anyone who isn’t the NSA, because brute-forcing something like this with a reasonable key length would take more than anyone’s lifetime unless you have one of the best supercomputers in the world (and even then, it’s not a guarantee depending on the key length)

    It’s why people pretty much exclusively talk about other potential vulnerabilities instead when they’re discussing cracking full disk encryption, like the aforementioned “hit him with a wrench until he tells us the password” lol

    • Omega_Haxors@lemmy.ml
      link
      fedilink
      arrow-up
      0
      arrow-down
      1
      ·
      1 year ago

      It is brute force but you only have to scan a fraction of the data which makes it blazing fast. Unless your password is 30+ characters it isn’t going to take all that long, especially if you vaguely remember things such as the password length and if it contains certain numbers or not.

          • FuckBigTech347@lemmygrad.ml
            link
            fedilink
            arrow-up
            2
            ·
            1 year ago

            This video doesn’t prove that “encryption” is fast to crack, at all. The first part is literally just about trying millions of most commonly used passwords and the second “crack” relies on an insecure password. Also anyone who stores their most sensitive data in a ZIP file on Windows is doing it completely wrong. There are much better options than ZIP plus Microsoft likely already knows your password before you’re done encrypting your files because Windows probably key logged it.

      • ShiningWing@lemmygrad.mlOP
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        I’m sorry, but do you have a source for it being that fast? I haven’t seen any mention of that anywhere else, at least when it comes to this area of encryption

        You also don’t specify what kind of hardware would be needed to make that fast, how fast you’re thinking, or even what type of encryption you’re talking about, all of which are pretty important

        I’m not sure this fact would make much of a difference here anyway, because it’s not like you’re ever scanning the entire disk in the first place, you’re trying to decrypt a specific string in the header in a specific place even if you’re just unlocking it normally, and if that really was so insecure, it would be pretty well known and nobody would ever use it

      • chayleaf@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        With an alphabet of 50 characters, there’s 15 billion 6 character passwords, and 250 quintillion 12 characrer passwords; that’s anything but fast