Buddahriffic

joined 2 years ago
[–] Buddahriffic@lemmy.world 2 points 3 days ago

What's stored is hash(password). Then the password check is stored == hash(entered).

Hash(x) will be the same length, regardless of what x is. What that length is depends on which hash function it is. So the database can set the length of its storage for each user's password to the length of the hash and the hash function will take any size password.

[–] Buddahriffic@lemmy.world 9 points 3 days ago (1 children)

Until they remove checking that reg key from all versions other than maybe enterprise. If they decide that running windows requires an MS online account, they can keep bumping up the difficulty of running it without whenever they want.

[–] Buddahriffic@lemmy.world 12 points 3 days ago (2 children)

Which suggests to me that MS stores plaintext passwords. Because a hash function doesn't care about the length of what it's hashing, the output will always be the same length, so they could verify a 300 character password with the same storage space as a 3 character password.

[–] Buddahriffic@lemmy.world 2 points 3 days ago (1 children)

We are closer to the 2060s than the 1960s.

This year, 1975 is as far away as 2075.

[–] Buddahriffic@lemmy.world 10 points 4 days ago

Based on the other responses, better to be asking the question than assume he was stupid for asking it.

[–] Buddahriffic@lemmy.world 3 points 4 days ago

Even with civilisation or society, there's always been a subset of people looking to exploit whatever facet of existence they can, whether it be religion, politics, crimes of opportunity, weaknesses in social systems, or even the justice systems that are supposedly meant to deal with those flaws.

And to add even more complexity, other people who aren't pieces of shit looking to exploit others form emotional attachments to those who are and are fooled by their lies and will defend them. Others don't have attachments but see parallels to themselves and worry that attempts to deal with the problematic ones will result in the same treatment being applied to them (and aren't necessarily wrong because even justice trying to act in good faith can get it wrong).

It's all a complex web of power struggles and religion is just one set of stands.

[–] Buddahriffic@lemmy.world 1 points 5 days ago (1 children)

Yeah, it would most likely be a malicious trolling kind of theft which is probably why it doesn't happen often.

[–] Buddahriffic@lemmy.world 2 points 5 days ago

KQ6 was great though. You'd go through and beat the game but notice that you're many points short of the maximum and there were a bunch of loose threads that never got solved. It was the first game I ever played with two paths to the end and finding that second path was so good. Especially getting to play during one scene that was seen many times before as a cut scene, along with a puzzle whose solution completely changed the tone of the scene (figuratively and literally lol).

Though I don't think I have the patience to do all of that again. I think I originally played that game over a period of months with no progress at all in many sessions. But I kept coming back to it as a kid.

[–] Buddahriffic@lemmy.world 6 points 6 days ago

Yeah, but that's just a button and maybe a light.

[–] Buddahriffic@lemmy.world 2 points 6 days ago (1 children)

Unless it's java.

[–] Buddahriffic@lemmy.world 3 points 6 days ago (5 children)

Wait, does this mean that if you have a smart doorbell, someone could just walk up to it, grab it, and walk away with it?

view more: next ›