Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:"bias against certain demographic groups" (Score 1) 90

You can only make this argument AHEAD OF TIME. You don't get to pick your data, train the AI, peek at the output of the trained AI, and then say, golly jeepers, I don't like the political implication of the results, so let's do-over. At that point, YOU are introducing an overt, explicit bias.

I mean you can, but that's politics, not science. If you want to do science, you pick your protocol ahead of time, and let it lead you where it may.

Submission + - New John the Ripper Cracks Passwords on FPGAs

solardiz writes: John the Ripper is the oldest still evolving password cracker program (and Open Source project), first released in 1996. John the Ripper 1.9.0-jumbo-1, which has just been announced with a lengthy list of changes, is the first release to include FPGA support (in addition to CPU, GPU, and Xeon Phi). This is a long-awaited (or long-delayed) major release, encompassing 4.5 years of development and 6000+ commits by 80+ contributors. From the announcement:

"Added FPGA support for 7 hash types for ZTEX 1.15y boards [...] we support: bcrypt, descrypt (including its bigcrypt extension), sha512crypt & Drupal7, sha256crypt, md5crypt (including its Apache apr1 and AIX smd5 variations) & phpass. As far as we're aware, several of these are implemented on FPGA for the very first time. For bcrypt, our ~119k c/s at cost 5 in ~27W greatly outperforms latest high-end GPUs per board, per dollar, and per Watt. [...] We also support multi-board clusters (tested [...] for up to 16 boards, thus 64 FPGAs, [...] on a Raspberry Pi 2 host)."

Slashdot Top Deals

God help those who do not help themselves. -- Wilson Mizner

Working...