OurBigBook
About
$
Donate
Sign in
+
Sign up
by
Ciro Santilli
(
@cirosantilli,
36
)
Disk encryption
...
Area of technology
Information technology
Computer
Computer science
Cryptography
Encryption
0
Like
1 By others
on same topic
0 Discussions
Updated
2025-04-24
+
Created
1970-01-01
See my version
Table of contents
Can a smartphone's PIN or password be brute-forced in an offline attack?
Disk encryption
Linux Unified Key Setup
Disk encryption
Disk encryption password handover plausible deniability
Disk encryption
Can a smartphone's PIN or password be brute-forced in an offline attack?
0
0
0
Disk encryption
security.stackexchange.com/questions/202174/can-a-smartphones-pin-or-password-be-brute-forced-in-an-offline-attack
Ciro Santilli
has a
hard
time
understanding why this is possible, e.
g
. many people use short
4
digit pins, or
a
short swipe
pattern
. Why can'
t
this be cracked easily offline?
Linux Unified Key Setup
(LUKS)
0
1
0
Disk encryption
Disk encryption password handover plausible deniability
0
0
0
Disk encryption
security.stackexchange.com/questions/135846/is-plausible-deniability-actually-feasible-for-encrypted-volumes-disks
security.stackexchange.com/questions/87153/linux-plausibly-deniable-file-system
Can
we
do better than "wrong
password
implies random
bytes
"?
Can the last disk access
times
be checked via forensic methods?
Ancestors
(8)
Encryption
Cryptography
Computer science
Computer
Information technology
Area of technology
Technology
Home
Incoming links
(1)
Symmetric encryption
View article source
Discussion
(0)
Subscribe (1)
+
New discussion
There are no discussions about this article yet.
Articles by others on the same topic
(1)
Show body
Body
0
Disk encryption
by
Wikipedia Bot
0
1970-01-01
See all articles in the same topic
+
Create my own version