karmacoma24
Full Member
Offline
Activity: 178
Merit: 100
LiskHQ CTO
|
|
August 22, 2014, 09:32:21 AM |
|
Make sure you use a strong 100 character pass phrase. Plus I would also recommend paying the 100 crypti for an equally strong secondary pass phrase.
Why on earth would anyone need 100 char password? ED25519 offers 128 bits security, which is equal to 22 character password (no special characters) 22 * log (62) / log) (2) = 130 <-------- already larger than 128 with just 22 characters Okay big boy Just trying to be helpful... Based on your excellent advice, I have now changed my pass phrase to: "ilovejustinbieber".
|
LISK Develop Decentralized Applications & Sidechains in JavaScript with Lisk!
|
|
|
Kevinrasf
|
|
August 22, 2014, 09:36:49 AM |
|
Make sure you use a strong 100 character pass phrase. Plus I would also recommend paying the 100 crypti for an equally strong secondary pass phrase.
Why on earth would anyone need 100 char password? ED25519 offers 128 bits security, which is equal to 22 character password (no special characters) 22 * log (62) / log) (2) = 130 <-------- already larger than 128 with just 22 characters Okay big boy Just trying to be helpful... Based on your excellent advice, I have now changed my pass phrase to: "ilovejustinbieber". He said 22 Characters so you can make it as Ilovejustinbierber4ever
|
|
|
|
|
Kevinrasf
|
|
August 22, 2014, 09:41:03 AM |
|
Guessing a bot will find this acc in no time.
|
|
|
|
Wulfcastle
|
|
August 22, 2014, 09:43:16 AM |
|
@SyRenity
Could you give us an update on the custom blockchains and SDK? Are you still going to release it in September? What apps will be released with it?
|
|
|
|
Eadeqa
|
|
August 22, 2014, 09:43:48 AM |
|
Guessing a bot will find this acc in no time. Sure he will He will be 50,000 Nxt + 1 nem stake richer. No problem, huh? Yeah, I am losing sleep already (not really, that was sarcasm) The largest ever publicly known brute force attack was against 64 bit (took 2 years by distributed-net -- hundreds of computers) and 64-bit is is weaker than 12 random characters.
|
|
|
|
Candy L93
|
|
August 22, 2014, 09:47:09 AM |
|
;Di'm glad to see the price.
|
|
|
|
crypti (OP)
|
|
August 22, 2014, 10:04:24 AM |
|
@SyRenity
Could you give us an update on the custom blockchains and SDK? Are you still going to release it in September? What apps will be released with it?
We will release our roadmap soon. But first we must concentrate our efforts to be sure everything works right.
|
|
|
|
Kevinrasf
|
|
August 22, 2014, 10:05:21 AM |
|
Guessing a bot will find this acc in no time. Sure he will He will be 50,000 Nxt + 1 nem stake richer. No problem, huh? Yeah, I am losing sleep already (not really, that was sarcasm) The largest ever publicly known brute force attack was against 64 bit (took 2 years by distributed-net -- hundreds of computers) and 64-bit is is weaker than 12 random characters. Time will tell my friend.
|
|
|
|
Candy L93
|
|
August 22, 2014, 10:06:33 AM |
|
@SyRenity
Could you give us an update on the custom blockchains and SDK? Are you still going to release it in September? What apps will be released with it?
We will release our roadmap soon. But first we must concentrate our efforts to be sure everything works right. Good job dev and i think we shoul have a one-click installer.
|
|
|
|
Wulfcastle
|
|
August 22, 2014, 10:10:37 AM |
|
@SyRenity
Could you give us an update on the custom blockchains and SDK? Are you still going to release it in September? What apps will be released with it?
We will release our roadmap soon. But first we must concentrate our efforts to be sure everything works right. Please release it as soon as possible.
|
|
|
|
karmacoma24
Full Member
Offline
Activity: 178
Merit: 100
LiskHQ CTO
|
|
August 22, 2014, 10:11:59 AM |
|
Fair point comrade... I was simply following the advice from the login screen like any typical user would currently do. For security reasons, please use long pass phrases. We recommend pass phrases as long as 100 characters.
|
LISK Develop Decentralized Applications & Sidechains in JavaScript with Lisk!
|
|
|
Viper1
|
|
August 22, 2014, 10:14:53 AM |
|
Without knowing the key, wouldn't this basically be impossible? lol
|
BTC: 1F8yJqgjeFyX1SX6KJmqYtHiHXJA89ENNT LTC: LYAEPQeDDM7Y4jbUH2AwhBmkzThAGecNBV DOGE: DSUsCCdt98PcNgUkFHLDFdQXmPrQBEqXu9
|
|
|
Eadeqa
|
|
August 22, 2014, 10:24:28 AM |
|
Without knowing the key, wouldn't this basically be impossible? lol Cracking a 15 random character password like this one: Fp7fq7aHSRNupa5 ? Pretty close to impossible even for entire bitcoin network combined (well will take them 50+ years at current hash rate) The problem is that people don't generate random passwords. If someone has a password like "Philippians4:6-7" or a password like, "one small step for man, one giant step for mankind" then that easy to crack -- as these are not random characters. Pick 15 cards from a shuffled deck of cards (that's how I picked that 15 char password in the challenge), and that is pretty close to impossible to crack. Make it 22 characters and that is same as ED25519 security.
|
|
|
|
profitofthegods
|
|
August 22, 2014, 10:28:36 AM |
|
Did we get a solution to the problems with running a Crypti node on AWS?
|
|
|
|
Viper1
|
|
August 22, 2014, 10:29:57 AM |
|
Without knowing the key, wouldn't this basically be impossible? lol Cracking a 15 random character password like this one: Fp7fq7aHSRNupa5 ? Pretty close to impossible even for entire bitcoin network combines (well will take them 50+ years at current hash rate) The problem is that people don't generate random passwords. If someone has a password like Philippians4:6-7 or a password like, "one small step for man, one giant step for mankind" then that easy to crack -- as these are not random characters. Pick 15 cards from a shuffled deck of cards (that's how I picked that 15 char password in the challenge), and that is pretty close to impossible to crack How was the hash you posted generated? What I mean is that usually you'll generate the hash with a private key. So not knowing what the private key is, it would seem to make it next to impossible to figure out the password. Or is there some "standard" way of generating the private key for these sorts of things, like another sha256 hash of something? Don't know much about this sort of stuff.
|
BTC: 1F8yJqgjeFyX1SX6KJmqYtHiHXJA89ENNT LTC: LYAEPQeDDM7Y4jbUH2AwhBmkzThAGecNBV DOGE: DSUsCCdt98PcNgUkFHLDFdQXmPrQBEqXu9
|
|
|
Eadeqa
|
|
August 22, 2014, 10:33:03 AM |
|
How was the hash you posted generated? What I mean is that usually you'll generate the hash with a private key. So not knowing what the private key is, it would seem to make it next to impossible to figure out the password. Or is there some "standard" way of generating the private key for these sorts of things, like another sha256 hash of something? Don't know much about this sort of stuff.
Hash was generated by something like this . http://onlinemd5.com/ It's SHA256. So for example hash for "Fp7fq7aHSRNupa5" is 79641338EF8FFE97C337C023E6ECB2B35EF32B206A85E79C9131491052BE0F99
|
|
|
|
atleticofa
|
|
August 22, 2014, 10:38:16 AM |
|
I downloaded the new version, and now it's synchronized and running smoothly GOOD JOB! Forging enabled
|
|
|
|
hobogo
Member
Offline
Activity: 80
Merit: 10
|
|
August 22, 2014, 10:43:16 AM |
|
why I cannot see my withdrawal transaction/funds in the web wallet?
|
|
|
|
Wulfcastle
|
|
August 22, 2014, 10:43:56 AM |
|
I downloaded the new version, and now it's synchronized and running smoothly GOOD JOB! Forging enabled Is there a new version?
|
|
|
|
|