Toot

Written by haui on 2024-09-19 at 20:47

I did quite some reading in my time, as I mentioned. The methods you are describing are riddled with ifs and buts. The reality is that even online systems arent hacked if they dont have obvious flaws like passwords in root ssh. on the other hand tools like john the ripper can break each and every common encryption given the right circumstances. Its no difference. Its all just marketing.

=> More informations about this toot | View the thread | More toots from haui_lemmy@lemmy.giftedmc.com

Mentions

=> View Lemongrab@lemmy.one profile

Tags

Proxy Information
Original URL
gemini://mastogem.picasoft.net/toot/113166178765986924
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
225.472809 milliseconds
Gemini-to-HTML Time
0.61662 milliseconds

This content has been proxied by September (3851b).