Mathematical Strength of Login Credential

Slack leaked hashed passwords from its servers for years

The report reads “The problem is that while the passwords were hashed and salted, and Slack noted that “it is practically infeasible for a password to be derived from the hash,” extracting a password is possible (the key word is “practically”). Miscreants are well versed in brute-force methods and it has been possible to harvest those passwords for years.”

Wouldn’t you be interested to make your password strong enough to stand very fierce brute force attacks with a minimal effort? — You would then not have to panic even when some websites have leaked your passwords that were hashed without unique salts.

For now, you could try this Hybrid Text Password made of ‘remembered’ and ‘stored’ text passwords — “Quick-Fix Solution when EPS is Not Available”

Then, please be patient to wait for the arrival of our Expanded Password System solutions powered by your non-volatile episodic memory -

First watch this 90-second introductory video on the solution we offer — “Fend Off Cybercrime by Episodic Memory”

Then you might hopefully be interested to glance at P9 on ‘What about Entropy’ of this presentation —

Website —

Digital identity blogs collected at



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hitoshi Kokumai

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.