Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not that it matters much in practice, but a 60-character uniformly random password is overkill. Given that a 128 bit key is considered secure and one may occasionally need to type a password due to technical constraints, 21 randomly selected characters from a 72-character alphabet is enough. Double it if you want to target 256-bit security, but the threat model here doesn’t really support that. Are you expecting a large-scale quantum computer attack on the HN password hash database?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: