sanitation@lemmy.today to Privacy@lemmy.dbzer0.com · 3 days ago60% of MD5 password hashes are crackable in under an hourwww.theregister.comexternal-linkmessage-square22fedilinkarrow-up176arrow-down17cross-posted to: cybersecurity@sh.itjust.workstechnology@lemmit.online
arrow-up169arrow-down1external-link60% of MD5 password hashes are crackable in under an hourwww.theregister.comsanitation@lemmy.today to Privacy@lemmy.dbzer0.com · 3 days agomessage-square22fedilinkcross-posted to: cybersecurity@sh.itjust.workstechnology@lemmit.online
minus-squarekmartburrito@lemmy.worldlinkfedilinkarrow-up10·3 days agoYep, and md5 is only used by many because it’s so fast. Cutting corners for speed’s sake is always going to come with a penalty somewhere.
minus-squaregravitas_deficiency@sh.itjust.workslinkfedilinkEnglisharrow-up3·2 days agoAnd, you know, checksums, which MD5 is honestly great for
minus-squaredoughless@lemmy.worldlinkfedilinkarrow-up2·2 days agoMD5 is vulnerable to collisions, so it’s possible for an attacker to match checksums, too.
Yep, and md5 is only used by many because it’s so fast. Cutting corners for speed’s sake is always going to come with a penalty somewhere.
And, you know, checksums, which MD5 is honestly great for
MD5 is vulnerable to collisions, so it’s possible for an attacker to match checksums, too.