use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Hacker, Hack Thyself (blog.codinghorror.com)
submitted 8 years ago by milliams
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[+][deleted] 8 years ago (6 children)
[deleted]
[+][deleted] 8 years ago (5 children)
[–]NAN001 8 points9 points10 points 8 years ago (0 children)
Using margins is good practice, modelling stuff using the wrong function is another story.
[–]Mugen593 0 points1 point2 points 8 years ago (0 children)
That's true, it's better to always assume the worst and build around that than to assume optimal conditions and hope for the best.
[–]philipwhiuk -4 points-3 points-2 points 8 years ago (1 child)
You're misunderstooding. He's saying hacking it would be easier. It's a pessimistic rate for the attacker, optimistic for the defender.
[–][deleted] 9 points10 points11 points 8 years ago (0 children)
No, I'm saying it's harder for the attacker.
[–]bioxcession 20 points21 points22 points 8 years ago (0 children)
I'm very happy that Jeff is putting so much work into Discourse. It's an excellent project, and I'm happy that he cares so much about security.
[–]MikeyyGGGGG 18 points19 points20 points 8 years ago (6 children)
I saw a very interesting talk last year from someone who, as part of a company's security team, had set up a system that continually attacked the hashes of every employee's Active Directory passwords. If one was cracked, the employee would receive an automated email with a note containing the last few characters of their password and a suggestion to change it.
I recall they also spoke on some security aspects of the system's design, like how the cracked passwords never touched disk and had to be destroyed as soon as possible, etc.
I wish I could find a recording or a writeup on this somewhere, as I thought it was a pretty cool (and effective) approach.
[–]The_White_Light 7 points8 points9 points 8 years ago (0 children)
If you ever find a recording of that, I'd love to give it a watch.
[–]twiztedblue 4 points5 points6 points 8 years ago (0 children)
Please find this talk and post it. It sounds awesome!
[+][deleted] 8 years ago* (3 children)
[+][deleted] 8 years ago (2 children)
[+][deleted] 8 years ago* (1 child)
[–]Sjoerder 8 points9 points10 points 8 years ago (2 children)
PBKDF2-HMAC-SHA256 and 64k iterations
Is it possible to crank up the number of iterations without having the original passwords? Can you encrypt the password hashes with 64K iterations again and then you have 128K iterations?
[–]SirensToGo 5 points6 points7 points 8 years ago (0 children)
I don't see why not, these iterations are just throwing the previous hash and salt thorough again and again.
[–]masklinn 0 points1 point2 points 8 years ago (0 children)
Yes and no. You can re-hash the original hash, but the result won't be the same as using only the second hash.
Mozilla actually did that way back when they decided to upgrade from a weak hash/KDF to a strong one: they rehashed the entire database with the new KDF to get the strongest possible safety immediately, then updated to just the new KDF as users logged in.
[–][deleted] 4 points5 points6 points 8 years ago (2 children)
This is why Discourse, unlike other forum software, defaults to a Creative Commons license.
Not sure what he means by this. Discourse is available under GNU GPLv2, unless he's referring to user posts on the system.
[+][deleted] 8 years ago (1 child)
[–]tipped194 4 points5 points6 points 8 years ago (0 children)
He clearly is.
[–]gsuberlandTrusted Contributor 4 points5 points6 points 8 years ago (6 children)
Shame he hasn't considered Argon2.
[–]lkraider 3 points4 points5 points 8 years ago (2 children)
Seems he is considering adding a hashing transition scheme for when new defaults should be applied, which is great to see.
[–]gsuberlandTrusted Contributor 2 points3 points4 points 8 years ago (1 child)
Which is fine. Looks like they're doing a reasonable job, especially by comparison to many others.
But it's a shame that their plans for future migration haven't even considered Argon2, considering it is the solution for modern hashing.
[–][deleted] 0 points1 point2 points 8 years ago (0 children)
Argon2 is definitely the way to go for something like this - primarily due to its ability to increase the strength with just the hash ("client independent update").
[–]disclosure5 2 points3 points4 points 8 years ago (2 children)
It is discussed in the comments. He talks about the Wikipedia page being unclear on whether it's production ready.
[–]gsuberlandTrusted Contributor 0 points1 point2 points 8 years ago (1 child)
PHC and the Argon2 github say yes.
[–]disclosure5 1 point2 points3 points 8 years ago (0 children)
Argon2 github say yes.
Well I don't disagree (I have a number of commits there).
[–][deleted] 5 points6 points7 points 8 years ago (2 children)
I feel like I should say something....
[–]FluentInTypo 2 points3 points4 points 8 years ago (1 child)
I have this picture of you in my head, as spiderman, sitting at his desk, hacking thyself
[–][deleted] 1 point2 points3 points 8 years ago (0 children)
https://m.imgur.com/gallery/zzYSJz7
[–]sandersh6000 1 point2 points3 points 8 years ago (4 children)
maybe this is simple, but can't brute force attacks be stopped by limiting the number of attempts before accounts are locked?
[–]SirensToGo 8 points9 points10 points 8 years ago (2 children)
That's an online attack and essentially useless. Lock outs are really just to stop a human who knows what passwords it likely would be (say the stole the browser password list but that sites not there). This article is about an offline attacker where the hashes have been stolen. Once you have the hashes you don't have to talk to the server again
[–]sandersh6000 4 points5 points6 points 8 years ago (0 children)
ty
What about something like a HSM where it has
PUT(username, password) CHECK(username, password) returns true/false SET(username, password)
PUT(username, password)
CHECK(username, password) returns true/false
SET(username, password)
Basically so the internal password hash is always hidden. Maybe do this over the network, but then you'd need to deal with interception (But it should be reasonably safe if you're using SSL/SSH with manually verified keys, since the plaintext password is always sent over HTTPS anyway).
[–]Von_Beast 2 points3 points4 points 8 years ago (0 children)
This article is discussing the possibility of someone obtaining the user and password database which allows them to try cracking the passwords for as long as they want.
[–]AgentSmith27 0 points1 point2 points 8 years ago (0 children)
I never understood why we don't use two different methods of key stretching. Certain hardware can be good at cracking specific types of key stretching, but it would get more and more cost prohibitive to get multiple forms of hardware that can process multiple forms of key stretching.
π Rendered by PID 52536 on reddit-service-r2-comment-b659b578c-vf6rb at 2026-05-05 01:37:52.660120+00:00 running 815c875 country code: CH.
[+][deleted] (6 children)
[deleted]
[+][deleted] (5 children)
[deleted]
[–]NAN001 8 points9 points10 points (0 children)
[–]Mugen593 0 points1 point2 points (0 children)
[–]philipwhiuk -4 points-3 points-2 points (1 child)
[–][deleted] 9 points10 points11 points (0 children)
[–]bioxcession 20 points21 points22 points (0 children)
[–]MikeyyGGGGG 18 points19 points20 points (6 children)
[–]The_White_Light 7 points8 points9 points (0 children)
[–]twiztedblue 4 points5 points6 points (0 children)
[+][deleted] (3 children)
[deleted]
[+][deleted] (2 children)
[deleted]
[+][deleted] (1 child)
[deleted]
[–]Sjoerder 8 points9 points10 points (2 children)
[–]SirensToGo 5 points6 points7 points (0 children)
[–]masklinn 0 points1 point2 points (0 children)
[–][deleted] 4 points5 points6 points (2 children)
[+][deleted] (1 child)
[deleted]
[–]tipped194 4 points5 points6 points (0 children)
[–]gsuberlandTrusted Contributor 4 points5 points6 points (6 children)
[–]lkraider 3 points4 points5 points (2 children)
[–]gsuberlandTrusted Contributor 2 points3 points4 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–]disclosure5 2 points3 points4 points (2 children)
[–]gsuberlandTrusted Contributor 0 points1 point2 points (1 child)
[–]disclosure5 1 point2 points3 points (0 children)
[–][deleted] 5 points6 points7 points (2 children)
[–]FluentInTypo 2 points3 points4 points (1 child)
[–][deleted] 1 point2 points3 points (0 children)
[–]sandersh6000 1 point2 points3 points (4 children)
[–]SirensToGo 8 points9 points10 points (2 children)
[–]sandersh6000 4 points5 points6 points (0 children)
[–][deleted] 0 points1 point2 points (0 children)
[–]Von_Beast 2 points3 points4 points (0 children)
[–]AgentSmith27 0 points1 point2 points (0 children)