Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
ufmace
5y ago
0 comments
Share
AFAIK, the base algorithms here are custom-fabricated ASICs. If your adversary can custom-fab ASICs to break hashes in your PW manager password in PBKDF2-SHA256, no reason they couldn't make one in whatever harder algorithm you could come up with.
0 comments
default
newest
oldest
Kuinox
5y ago
ASIC doesn't work well when a lot of RAM is required.
j
/
k
navigate · click thread line to collapse