Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours ago60% of MD5 password hashes are crackable in under an hourwww.theregister.comexternal-linkmessage-square28fedilinkarrow-up1111arrow-down15cross-posted to: technology@lemmit.online
arrow-up1106arrow-down1external-link60% of MD5 password hashes are crackable in under an hourwww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square28fedilinkcross-posted to: technology@lemmit.online
minus-squareUndercoverUlrikHD@programming.devlinkfedilinkEnglisharrow-up1·6 hours agoYeah, but what would you do with it? Can you convert the bytes to work on any other sensor the victim may also use their fingerprint? Never looked into the real implementation details of the fingerprint hardware.
minus-squareNatanael@slrpnk.netlinkfedilinkEnglisharrow-up1·3 hours agoSometimes you can. Or just bruteforce a colliding pattern that matches to print that instead, because why not
Yeah, but what would you do with it? Can you convert the bytes to work on any other sensor the victim may also use their fingerprint? Never looked into the real implementation details of the fingerprint hardware.
Sometimes you can. Or just bruteforce a colliding pattern that matches to print that instead, because why not