I did quite some reading in my time, as I mentioned. The methods you are describing are riddled with ifs and buts. The reality is that even online systems arent hacked if they dont have obvious flaws like passwords in root ssh. on the other hand tools like john the ripper can break each and every common encryption given the right circumstances. Its no difference. Its all just marketing.
=> More informations about this toot | View the thread | More toots from haui_lemmy@lemmy.giftedmc.com
=> View Lemongrab@lemmy.one profile
text/gemini
This content has been proxied by September (3851b).