Comment by cassianoleal
13 hours ago
Fair enough, but that doesn't protect you in case of a leak. If you're going to solve for the leak anyway, is it worth it to solve for brute force in isolation? You can always add another couple of characters. At which point do you stop?
No comments yet
Contribute on Hacker News ↗