• sga@piefed.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          17 days ago

          i guess you mean bogo sort? just verifying that output is sorted requires O(n). In Quantum bogo sort, you can skip verification.

          • Jimbabwe@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            17 days ago

            Yeah, stupid autocorrect. And verifying ain’t the same as doing. I’ll come in, I’ll “sort” your data, and I’ll do it damn fast. You want verification that’s extra!

            • sga@piefed.social
              link
              fedilink
              English
              arrow-up
              0
              ·
              17 days ago

              but how do you know you are done. maybe there are different ideas of what bogo sort is, but as i remember, it is basically a while true (or while false loop) with condition - while list_is_not_sorted { return_a_random_ordering }

  • Septimaeus@infosec.pub
    link
    fedilink
    arrow-up
    0
    ·
    18 days ago

    Suggesting that an authorized user would re-attempt the correct login?

    I have only one real-world example of a site where I would do that, and it’s because I know that it behaves this way (though for that site, if I had to guess, it’s likely a bug related to poorly designed async handling rather than an explicit check like in the comic). In most cases, I would assume PW recorded incorrectly in the first place and go straight for the password reset workflow.

    Not sure how representative that user behavior is, but the population is N ≥ 1.

      • MonkeMischief@lemmy.today
        link
        fedilink
        arrow-up
        0
        ·
        18 days ago

        Don’t worry, a not-insignificant number of users probably use “Forgot Password?” every time because they can’t keep track of the correct one. Lol

        I suspect this is why we started to see all those “use a temporary password instead” options lately. XD

    • black0ut@pawb.social
      link
      fedilink
      arrow-up
      0
      ·
      18 days ago

      All tools that bruteforce passwords attempt each password only once, and if it doesn’t work, discard it. Nobody really runs 2 identical attacks back to back (they’re incredibly slow when done over the internet), so the password would seem uncrackable at first glance.

      This approach wouldn’t work with hash cracking, vault breaking or file encryption, because once they get their hands on the hash/vault/file, the attacker can use their own code for hashing/checking a password candidate.

    • TheseusNow@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      17 days ago

      It doesn’t. Cracking programs don’t use the user login form repeatedly. They use the same algorithm that creates the publicly encoded password to generate encoded passwords and keep going until they have a match. Besides getting the encoded password and salt, everything is done offline.

      This just creates a really bad user experience.

      • Camelbeard@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        17 days ago

        If they actually use the real login form, most websites block an account after X attempts. Sometimes for 1-24 hours, sometimes until you do a PW reset

    • MyTurtleSwimsUpsideDown@fedia.io
      link
      fedilink
      arrow-up
      0
      ·
      18 days ago

      It rejects the first [correct] login attempt (it’s worded poorly). It assumes that a brute force attacker will try any given password once and move on, while a human user will think they made a typo and try again. This works until the attacker realizes that it takes two attempts, in which case it merely doubles the attempts required to breach the account. Simply requiring an additional password character would be vastly more effective.

  • Johanno@feddit.org
    link
    fedilink
    arrow-up
    0
    ·
    18 days ago

    Even worse the silent invalidation of a correct password.

    Use password manager.

    Can’t log in, because “password is incorrect”… Fuck you! It is not! I copied in the same fucking thing as months before! If you want to force me to change it then say it! Asshole!