Re: [iPad] Researchers Crack iOS-Generated Hotspot Passwords in 50 Seconds - Mac Rumors

 

On 6/21/2013 3:16 AM, Tony wrote:
>
>
> I guess they could have been better? In any case we are free to add our
> own.
> I will keep an eye out for a dude following me with a wheelbarrow load
> of CPU/GPU power.
[snip]

That explains the huge array of computers in the black van with the
tinted windows that parked next to me yesterday! Darn pigs were simply
trying to piggyback onto my hotspot!

While I really don't care that someone was able to work out an algorithm
to crack the iOS created passwords for the iPhone's hotspot, what is
really bewildering is why Apple felt it had to use words in the first place.

Why not just have random letters/digits/special-characters interspersed?

With 52 letters (26 lower-case and 26 upper-case) plus 10 digits plus 30
special characters that I see on my pc's keyboard, that gives a pool of
92 possible things to put in any single spot, and if they keep the
10-character minimum length that is what my iPhone generates, that makes
for 92-raised-to-the-10th-power possible iOS created passwords.

Certainly much harder to crack than using 10,000 possible numbers and
50,000 words.

--
David H. Bailey
dhbailey@davidbaileymusicstudio.com
http://www.davidbaileymusicstudio.com

__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (3)
Recent Activity:
.

__,_._,___