OurBigBook
About
$
Donate
Sign in
+
Sign up
by
Ciro Santilli
(
@cirosantilli,
36
)
Encryption
...
Technology
Area of technology
Information technology
Computer
Computer science
Cryptography
0
Like
1 By others
on same topic
0 Discussions
Updated
2025-04-24
+
Created
1970-01-01
See my version
Table of contents
Encryption software
Encryption
OpenSSL
Encryption software
Steganography
Encryption
Deniable authentication
Encryption
End-to-end encryption
Encryption
Forward secrecy
Encryption
Disk encryption
Encryption
Can a smartphone's PIN or password be brute-forced in an offline attack?
Disk encryption
Linux Unified Key Setup
Disk encryption
Disk encryption password handover plausible deniability
Disk encryption
Encryption software
0
1
0
Encryption
OpenSSL
0
1
0
Encryption software
Steganography
0
1
0
Encryption
Deniable authentication
0
1
0
Encryption
End-to-end encryption
(E2EE)
0
1
0
Encryption
Tags:
Good
Forward secrecy
0
1
0
Encryption
stackoverflow.com/questions/20505942/how-does-perfect-forward-secrecy-pfs-work/66118134#66118134
Disk encryption
0
1
0
Encryption
Can a smartphone's PIN or password be brute-forced in an offline attack?
0
0
0
Disk encryption
security.stackexchange.com/questions/202174/can-a-smartphones-pin-or-password-be-brute-forced-in-an-offline-attack
Ciro Santilli
has a
hard
time
understanding why this is possible, e.
g
. many people use short
4
digit pins, or
a
short swipe
pattern
. Why can'
t
this be cracked easily offline?
Linux Unified Key Setup
(LUKS)
0
1
0
Disk encryption
Disk encryption password handover plausible deniability
0
0
0
Disk encryption
security.stackexchange.com/questions/135846/is-plausible-deniability-actually-feasible-for-encrypted-volumes-disks
security.stackexchange.com/questions/87153/linux-plausibly-deniable-file-system
Can
we
do better than "wrong
password
implies random
bytes
"?
Can the last disk access
times
be checked via forensic methods?
Tagged
(1)
Cool data embedded in the Bitcoin blockchain
/
Encrypted data
Ancestors
(7)
Cryptography
Computer science
Computer
Information technology
Area of technology
Technology
Home
Incoming links
(3)
Cool data embedded in the Bitcoin blockchain
/
Ordinal ASCII art inscription
Public-key cryptography
Symmetric encryption
Synonyms
(1)
cirosantilli/encrypted
View article source
Discussion
(0)
Subscribe (1)
+
New discussion
There are no discussions about this article yet.
Articles by others on the same topic
(1)
Show body
Body
0
Encryption
by
Wikipedia Bot
0
1970-01-01
See all articles in the same topic
+
Create my own version