Mathematical Strength of Login Credential
Slack leaked hashed passwords from its servers for years
The report reads “The problem is that while the passwords were hashed and salted, and Slack noted that “it is practically infeasible for a password to be derived from the hash,” extracting a password is possible (the key word is “practically”). Miscreants are well versed in brute-force methods and it has been possible to harvest those passwords for years.”
Wouldn’t you be interested to make your password strong enough to stand very fierce brute force attacks with a minimal effort? — You would then not have to panic even when some websites have leaked your passwords that were hashed without unique salts.
For now, you could try this Hybrid Text Password made of ‘remembered’ and ‘stored’ text passwords — “Quick-Fix Solution when EPS is Not Available” https://www.linkedin.com/posts/hitoshikokumai_official-british-army-twitter-and-youtube-activity-6951354977126600704-uHyr
Then, please be patient to wait for the arrival of our Expanded Password System solutions powered by your non-volatile episodic memory -
First watch this 90-second introductory video on the solution we offer — “Fend Off Cybercrime by Episodic Memory” https://youtu.be/T1nrAlmytWE
Then you might hopefully be interested to glance at P9 on ‘What about Entropy’ of this presentation — https://www.slideshare.net/HitoshiKokumai/fend-off-cybercrime-with-episodic-memory-29july2022pdf
Website — https://www.mnemonicidentitysolutions.com/
Digital identity blogs collected at https://www.linkedin.com/pulse/collection-digital-identity-comments-hitoshi-kokumai-posted-kokumai/