brownell | 5 years ago | on: Microsoft just force restarted my Windows PC again to install more unwanted apps
brownell's comments
brownell | 7 years ago | on: Facebook chooses Canada for Dating feature launch
brownell | 7 years ago | on: Recaptcha v3: new way to stop bots
brownell | 7 years ago | on: Two Canadian banks say accounts compromised: CIBC 40,000 and BMO 50,000
brownell | 7 years ago | on: Judge Rules Trump Can’t Block People on Twitter
If it's the former, then I would agree with you. If it's the latter, and you're not actually blocked from posting (saying) anything, then where exactly is the violation?
brownell | 7 years ago | on: Twitter urges users to change passwords after computer 'glitch'
> Alternatively a timestamp would be just as good.
I don't see how that would work at all.
I also don't see the need to go any further in detail about how this scheme will not be better than the current best practices.
Never. Roll. Your. Own. Crypto. https://security.stackexchange.com/questions/18197/why-shoul...
brownell | 7 years ago | on: Twitter urges users to change passwords after computer 'glitch'
--
Server stores hashed-password, hash-salt, and random-salt.
Server sends hash-salt, and random-salt to client.
Client uses user password and hash-salt to generate hashed-password.
Client hashes hashed-password using random-salt.
Client sends hashed-hashed-password to server.
Server grabs stored hashed-password and hashes used stored random-salt to check for match against client's hashed-hashed-password.
--
So the only thing this actually does is not share the text of the password that the user typed to the server. But at a technical level, now the hashed-password is the new "password".
Let's say the database is compromised. The attacker has the hashed-password. They make a login request to fetch the random-salt, hash their stolen hashed-password with it and send that to the server. Owned.
Along with being more complicated with no real gain, this also takes the hashing away from the server-side, which is a big negative, as the time that it takes to hash a password is a control method used to mitigate attacks.
Just send the plain-text password over HTTPS and hash it the moment it hits the server. There's no issue with this technique (as long as it's not logged!)
brownell | 8 years ago | on: Facebook Lies
Years ago they did not delete accounts. They would deactivate it and never delete the data. They do now (apparently), but in the past they were very openly not deleting anything.
brownell | 13 years ago | on: Opera moves to WebKit
parseInt('08', 10); // 8
Perhaps that's why you aren't asked?