Author

Topic: [ANN][LSK] Lisk | Blockchain Application Platform for JavaScript Developers - page 876. (Read 3074324 times)

legendary
Activity: 1120
Merit: 1000
waiting for LISK 80k again
sr. member
Activity: 336
Merit: 250
I recommend people use the same password for everything.  Make it 3 letters so you never forget it.  Also it's best to use just lower case so that it is easier to type.  Don't use 2FA because it is an extra hassle.  Also always keep firewalls disabled.

That sounds unsafe... just send the password to me, I will remember it for you.  Lips sealed

Do what have the people out there have done - use your first name, all lower case, and your birthyear.

Oh wait.....that's a bad idea?

That's almost as dumb as putting your mailing address in the spot of the wallet address, because it asks for your address.  But that's where I want my tokens sent!
sr. member
Activity: 432
Merit: 250
I recommend people use the same password for everything.  Make it 3 letters so you never forget it.  Also it's best to use just lower case so that it is easier to type.  Don't use 2FA because it is an extra hassle.  Also always keep firewalls disabled.

That sounds unsafe... just send the password to me, I will remember it for you.  Lips sealed

Do what half the people out there have done - use your first name, all lower case, and your birthyear.
hero member
Activity: 784
Merit: 1000
Guess this is time to buy as many as you can.Once things will be putted together there will be just one direction and that is just upward.All the day traders will just miss the opportunity.It will be soon on its way to new ath.
full member
Activity: 126
Merit: 100
LOL. If he could hack passphrases he would be rich....and never telling it to the community.
hero member
Activity: 533
Merit: 500
I find this very suspicious since if I'd found a flaw in a coin I was invested in I'd take it directly to the devs rather than blab it all over the internet.

Yes.  It is most likely an attempt at scaring people but it hasn't worked.

As I say, Im not fudding here and not try to scare people.

Just want to warn you all.

No FUDing is precisely what you are doing. Even if you are sincere then there are ways to go about it without causing a panic. Instead you chose the FUD and panic route. Aside from the fact that your claim is very questionable, your decision to deliver the news in the most public way possible calls your motives deeply into question.

In other words, nice try.  Roll Eyes
legendary
Activity: 1120
Merit: 1008
CryptoTalk.Org - Get Paid for every Post!
Sad
Sorry guys, I dont want
to spread FUD here,  but this
is very serious.

I think I find a flaw in Lisk sourcecode.

This is much more bad than DAO bug.
Its so easy to bruteforce passphrases with
a few low end GPU cards, simple software
and database of english words.

I already tested it with my LISK addresses,
and I success to hack my address in less than
6 hours.

This need to be fixed as fast as possible
If you could access any lisk address than why don't you access developer's address try to move some coins from there if you can't do that than this is just a FUD i think.
full member
Activity: 174
Merit: 100
A Coin A Day Keeps The Cold Away.
GUYS I"VE DISCOVERED A MAJOR BUG!!!!!!!!!!!!!!!!

Lisk runs on a computer.  Computers can be hacked.  Please PANIC NOW!




Later in school we'll be learning the difference between unavoidable and avoidable risks...    Roll Eyes



hero member
Activity: 627
Merit: 500
I recommend people use the same password for everything.  Make it 3 letters so you never forget it.  Also it's best to use just lower case so that it is easier to type.  Don't use 2FA because it is an extra hassle.  Also always keep firewalls disabled.

That sounds unsafe... just send the password to me, I will remember it for you.  Lips sealed
legendary
Activity: 1188
Merit: 1001
done and disable microsoft antivirus all for max security
legendary
Activity: 952
Merit: 1000
I recommend people use the same password for everything.  Make it 3 letters so you never forget it.  Also it's best to use just lower case so that it is easier to type.  Don't use 2FA because it is an extra hassle.  Also always keep firewalls disabled.
hero member
Activity: 504
Merit: 500
Communications Lead
I find this very suspicious since if I'd found a flaw in a coin I was invested in I'd take it directly to the devs rather than blab it all over the internet.

Yes.  It is most likely an attempt at scaring people but it hasn't worked.

As I say, Im not fudding here and not try to scare people.

Just want to warn you all.

1,025,109.8 words in the English language x 12 words x 75,000,000 checks per second

you get an impossible amount of time try harder please

that's like having 1,025,109.8 possible characters , and a password with a length of 12, even at trillions of checks per second you wont be able to crack anything
only 2048 words in the pass-dictionary, but still 5.444517870735016e+39 combinations

Main problem is that  passphrasses use only lowcase letter
without numbers included.

So its easier to bruteforce than Bitcoin key.

2048 words, if it was case sensitive it would be more than that , stop putin us on

yes, and if Max change code and make passphrasses case sensitive, that can
give extra security to Lisk.

That is an excellent point, but the initial "bug" is bogus
A 12 character passcode with only lower case letters has 95,428,956,661,682,176 combinations.

There are 26 letters , however there are 2048 words in the passphrase data base

Not to mention, one would have to have a perfect list of all those words specifically!

There are  1,025,109.8 words in the English language

Adding a variable of upper and lowercase alternating letters would definitely be great, but this Fud is just that, fud

Basically dont worry guys its all good


Max,... any comments...?

what comment do you need? it's enough said already...
everyone feel free to look in the javascript file (https://login.lisk.io/static/js/vendor_app.js line 56162, in english, chinese, spanish and japanese).
2048 words to the power of 12. Everyone can put that into calculator... its not possible to brute force.


Make sure to activate the 2nd passphrase for extra security. If someone were to find your Lisk address passphrase by brute force, they would need to brute force the 2nd passphrase which, in this case, would take millions and millions of years to break (even with the wordlist and a super computer).
legendary
Activity: 1666
Merit: 1020
expect(brain).toHaveBeenUsed()
I find this very suspicious since if I'd found a flaw in a coin I was invested in I'd take it directly to the devs rather than blab it all over the internet.

Yes.  It is most likely an attempt at scaring people but it hasn't worked.

As I say, Im not fudding here and not try to scare people.

Just want to warn you all.

1,025,109.8 words in the English language x 12 words x 75,000,000 checks per second

you get an impossible amount of time try harder please

that's like having 1,025,109.8 possible characters , and a password with a length of 12, even at trillions of checks per second you wont be able to crack anything
only 2048 words in the pass-dictionary, but still 5.444517870735016e+39 combinations

Main problem is that  passphrasses use only lowcase letter
without numbers included.

So its easier to bruteforce than Bitcoin key.

2048 words, if it was case sensitive it would be more than that , stop putin us on

yes, and if Max change code and make passphrasses case sensitive, that can
give extra security to Lisk.

That is an excellent point, but the initial "bug" is bogus
A 12 character passcode with only lower case letters has 95,428,956,661,682,176 combinations.

There are 26 letters , however there are 2048 words in the passphrase data base

Not to mention, one would have to have a perfect list of all those words specifically!

There are  1,025,109.8 words in the English language

Adding a variable of upper and lowercase alternating letters would definitely be great, but this Fud is just that, fud

Basically dont worry guys its all good


Max,... any comments...?

what comment do you need? it's enough said already...
everyone feel free to look in the javascript file (https://login.lisk.io/static/js/vendor_app.js line 56162, in english, chinese, spanish and japanese).
2048 words to the power of 12. Everyone can put that into calculator... its not possible to brute force.

legendary
Activity: 1223
Merit: 1002
GUYS I"VE DISCOVERED A MAJOR BUG!!!!!!!!!!!!!!!!

Lisk runs on a computer.  Computers can be hacked.  Please PANIC NOW!

hero member
Activity: 824
Merit: 500
CryptoTalk.Org - Get Paid for every Post!
GUYS I"VE DISCOVERED A MAJOR BUG!!!!!!!!!!!!!!!!

Lisk runs on a computer.  Computers can be hacked.  Please PANIC NOW!
lol  Grin my buy orders waiting for that  Grin Cheesy
legendary
Activity: 952
Merit: 1000
GUYS I"VE DISCOVERED A MAJOR BUG!!!!!!!!!!!!!!!!

Lisk runs on a computer.  Computers can be hacked.  Please PANIC NOW!
sr. member
Activity: 266
Merit: 250
hero member
Activity: 627
Merit: 500
12 word dice-ware like password - even if all lower case - is unbreakable now and in the near/medium/far future.
If the NSA was directly brute forcing this password it would take longer than the age of the universe currently.

I'm not sure what the LISK word space is, but diceware is 7776 words. 12 words = a password space so gigantic that an attacker, even knowing you used diceware and knowing you used 12 words would not be able to bruteforce it (even if the attacker is, say, the NSA).

Here is the size of the password space of a 12 word diceware word:

48,873,677,980,689,257,489,322,752,273,774,603,865,660,850,176

This number is not merely large, it's a monster. A supercomputer running 1 quadrillion guesses per second barely eats at this number.  

*the NSA can't do 1 quadrillion. If they could, it would take ca.10 nano-tullion (not even sure what the terminology for this number is officially) seconds to go through the entire space.

*found it, Nonillion... for perspective, 1 trillion seconds is 31,000+ years.

I find this very suspicious since if I'd found a flaw in a coin I was invested in I'd take it directly to the devs rather than blab it all over the internet.

Yes.  It is most likely an attempt at scaring people but it hasn't worked.

As I say, Im not fudding here and not try to scare people.

Just want to warn you all.

1,025,109.8 words in the English language x 12 words x 75,000,000 checks per second

you get an impossible amount of time try harder please

that's like having 1,025,109.8 possible characters , and a password with a length of 12, even at trillions of checks per second you wont be able to crack anything
only 2048 words in the pass-dictionary, but still 5.444517870735016e+39 combinations

Main problem is that  passphrasses use only lowcase letter
without numbers included.

So its easier to bruteforce than Bitcoin key.

2048 words, if it was case sensitive it would be more than that , stop putin us on

yes, and if Max change code and make passphrasses case sensitive, that can
give extra security to Lisk.

That is an excellent point, but the initial "bug" is bogus
A 12 character passcode with only lower case letters has 95,428,956,661,682,176 combinations.

There are 26 letters , however there are 2048 words in the passphrase data base

Not to mention, one would have to have a perfect list of all those words specifically!

There are  1,025,109.8 words in the English language

Adding a variable of upper and lowercase alternating letters would definitely be great, but this Fud is just that, fud

Basically dont worry guys its all good


Max,... any comments...?
full member
Activity: 245
Merit: 103
I find this very suspicious since if I'd found a flaw in a coin I was invested in I'd take it directly to the devs rather than blab it all over the internet.

Yes.  It is most likely an attempt at scaring people but it hasn't worked.

As I say, Im not fudding here and not try to scare people.

Just want to warn you all.

1,025,109.8 words in the English language x 12 words x 75,000,000 checks per second

you get an impossible amount of time try harder please

that's like having 1,025,109.8 possible characters , and a password with a length of 12, even at trillions of checks per second you wont be able to crack anything
only 2048 words in the pass-dictionary, but still 5.444517870735016e+39 combinations

Main problem is that  passphrasses use only lowcase letter
without numbers included.

So its easier to bruteforce than Bitcoin key.

2048 words, if it was case sensitive it would be more than that , stop putin us on

yes, and if Max change code and make passphrasses case sensitive, that can
give extra security to Lisk.

That is an excellent point, but the initial "bug" is bogus
A 12 character passcode with only lower case letters has 95,428,956,661,682,176 combinations.

There are 26 letters , however there are 2048 words in the passphrase data base

Not to mention, one would have to have a perfect list of all those words specifically!

There are  1,025,109.8 words in the English language

Adding a variable of upper and lowercase alternating letters would definitely be great, but this Fud is just that, fud

Basically dont worry guys its all good


Max,... any comments...?
Jump to: