WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

955

(post is archived)

[–] 0 pt

Just add a second or so to each login attempt. This is already done by bcrypt, luks and probably most other sane systems that are also "timing attack" safe (research.kudelskisecurity.com).

[–] 0 pt

This works for remote systems. Once you have local access, or the hashed database, all bets are off.