mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-10 00:12:09 +00:00
Typo + wrong name
This commit is contained in:
parent
fd257cfd7e
commit
7769286085
2 changed files with 3 additions and 4 deletions
|
@ -201,8 +201,7 @@ If your threat model is a bit smaller, simulate putting a smaller object into th
|
|||
|
||||
## Sample unbreakable passwords
|
||||
|
||||
According to KeePassXC's password generator, each of the following passwords has en
|
||||
entropy between 330 and 340 bits.
|
||||
According to KeePassXC's password generator, each of the following passwords has an entropy between 330 and 340 bits.
|
||||
|
||||
Using the extended-ASCII character set:
|
||||
|
||||
|
@ -261,7 +260,7 @@ Another well-known approach to calculating physical limits of computation is Bre
|
|||
|
||||
## Acknowledgements
|
||||
|
||||
Thanks to Barna Zsombor and InPhase for helping me over IRC with my shaky physics and pointing out the caveats of my approach.
|
||||
Thanks to Barna Zsombor and Ryan Coyler for helping me over IRC with my shaky physics and pointing out the caveats of my approach.
|
||||
|
||||
My notes from Thermal Physics weren't enough to write this; various Wikipedia articles were also quite helpful, most of which were linked in the body of the article.
|
||||
|
||||
|
|
|
@ -260,7 +260,7 @@ MOAC a one-in-ten-trillion chance of cracking a password with 256 entropy bits a
|
|||
Sample unbreakable passwords
|
||||
----------------------------
|
||||
|
||||
According to KeePassXC's password generator, each of the following passwords has en
|
||||
According to KeePassXC's password generator, each of the following passwords has an
|
||||
entropy between 330 and 340 bits.
|
||||
|
||||
Using the extended-ASCII character set:
|
||||
|
|
Loading…
Reference in a new issue