• 0 Posts
  • 114 Comments
Joined 2 years ago
cake
Cake day: August 25th, 2023

help-circle








  • The add function in the example above probably traverses the call stack to see what line of the script is currently being executed by the interpreter, then reads in that line in the original script, parses the comment, and subs in the values in the function call.

    This functionality exists so when you get a traceback you can see what line of code triggered it in the error message











  • We are talking about RSA though, so there is a fixed character length and it isn’t meant to be remembered because your private key is stored on disk.

    Yes the word method is better than a random character password when length is unbounded, but creating secure and memorable passwords is a bit of an oxymoron in today’s date and age - if you are relying on remembering your passwords that likely means you are reusing at least some of them, which is arguably one of the worst things you can do.


  • bjorney@lemmy.catolinuxmemes@lemmy.world-----BEGIN PRIVATE KEY-----
    link
    fedilink
    arrow-up
    44
    arrow-down
    18
    ·
    edit-2
    1 year ago

    Words are the least secure way to generate a password of a given length because you are limiting your character set to 26, and character N gives you information about the character at position N+1

    The most secure way to generate a password is to uniformly pick bytes from the entire character set using a suitable form of entropy

    Edit: for the dozens of people still feeling the need to reply to me: RSA keys are fixed length, and you don’t need to memorize them. Using a dictionary of words to create your own RSA key is intentionally kneecapping the security of the key.