Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:The immediate question: (Score 1) 68

Salting just defends against precomputed hashes (rainbow tables). Using a slower algorithm such as bcrypt defends against brute force attacks.

Case in point: I cranked through LinkIn's 6+ million SHA hashes using a dictionary of around ~20 million words (not counting JtR's manipulation rules). The total runtime was maybe half an hour. Using bcrypt makes brute force attacks much less practical. It's also good practice to iterate your hashing algorithm, each time feeding the resultant hash as input. Running sha256sum tens of thousands of times is a lot slower than running it once.

Privacy

Using RFID and Wi-Fi to Track Students 183

An anonymous reader writes "The BBC reports on a proposal to use RFID and wi-fi to track students wherever they go on campus: 'Battery-powered RFID tags are placed on an asset and they communicate with at least three wireless access points inside the network to triangulate a location.' At The Wireless Event in London, 'Marcus Birkl, head of wireless at Siemens, said location tracking of assets or people was one of the biggest incentives for companies, hospitals and education institutions to roll out wi-fi networks.' The article points out that integration of RFID and wi-fi raises the possibility that RFID can be used for remote surveillance."

Slashdot Top Deals

We all like praise, but a hike in our pay is the best kind of ways.

Working...