zephyr@lemmy.worldM to linuxmemes@lemmy.world · 4 months ago-----BEGIN PRIVATE KEY-----lemmy.worldimagemessage-square77fedilinkarrow-up11.64Karrow-down124 cross-posted to: [email protected]
arrow-up11.62Karrow-down1image-----BEGIN PRIVATE KEY-----lemmy.worldzephyr@lemmy.worldM to linuxmemes@lemmy.world · 4 months agomessage-square77fedilink cross-posted to: [email protected]
minus-squarebjorney@lemmy.calinkfedilinkarrow-up1arrow-down1·edit-24 months ago“can you string words to form a valid RSA key” “Yes this is the most secure way to do it” “No, it’s not when there is a fixed byte length” -> where we are now
minus-squaresus@programming.devlinkfedilinkarrow-up2·4 months agothe direct chain I can see is “can you string words to form a valid RSA key” “I would hope so, [xkcd about password strength]” “words are the least secure way to generate random bytes” “Good luck remembering random bytes. That infographic is about memorable passwords.” “You memorize your RSA keys?” so between comments 2 and 3 and 4 I’d say it soundly went past the handcrafted RSA key stuff.
“can you string words to form a valid RSA key”
“Yes this is the most secure way to do it”
“No, it’s not when there is a fixed byte length”
-> where we are now
the direct chain I can see is
“can you string words to form a valid RSA key”
“I would hope so, [xkcd about password strength]”
“words are the least secure way to generate random bytes”
“Good luck remembering random bytes. That infographic is about memorable passwords.”
“You memorize your RSA keys?”
so between comments 2 and 3 and 4 I’d say it soundly went past the handcrafted RSA key stuff.