Viewing a response to: @robinhood/offline-attack-on-steem-user-credentials
Very interesting, so is this just a problem with user-generated passwords? Thanks *CG*
post_id | 148,426 |
---|---|
author | cryptogee |
permlink | re-robinhood-offline-attack-on-steem-user-credentials-20160720t001003519z |
category | steem |
json_metadata | "{"tags": ["steem"]}" |
created | 2016-07-20 00:10:06 |
last_update | 2016-07-20 00:10:06 |
depth | 1 |
children | 3 |
net_rshares | 67,102,256,013 |
last_payout | 2016-08-23 13:10:57 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.076 SBD |
curator_payout_value | 0.000 SBD |
pending_payout_value | 0.000 SBD |
promoted | 0.000 SBD |
body_length | 87 |
author_reputation | 371,535,229,097,172 |
root_title | "Offline Attack on Steem User Credentials" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 SBD |
percent_steem_dollars | 10,000 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
ihash | 0 | 26,324,658,063 | 100% | ||
jason | 0 | 40,777,597,950 | 100% |
I dug into the code for the "suggest password" option Steem provides at signup and as far as I could tell the logic there was 100% kosher.
post_id | 148,568 |
---|---|
author | robinhood |
permlink | re-cryptogee-re-robinhood-offline-attack-on-steem-user-credentials-20160720t001847000z |
category | steem |
json_metadata | "{"tags": ["steem"]}" |
created | 2016-07-20 00:18:48 |
last_update | 2016-07-20 00:18:48 |
depth | 2 |
children | 2 |
net_rshares | 352,268,673,794 |
last_payout | 2016-08-23 13:10:57 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.510 SBD |
curator_payout_value | 0.167 SBD |
pending_payout_value | 0.000 SBD |
promoted | 0.000 SBD |
body_length | 138 |
author_reputation | 2,616,843,664,428 |
root_title | "Offline Attack on Steem User Credentials" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 SBD |
percent_steem_dollars | 10,000 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
cass | 0 | 352,268,673,794 | 100% |
what does that mean? Was it good?
post_id | 149,709 |
---|---|
author | liondani |
permlink | re-robinhood-re-cryptogee-re-robinhood-offline-attack-on-steem-user-credentials-20160720t012502032z |
category | steem |
json_metadata | "{"tags": ["steem"]}" |
created | 2016-07-20 01:25:03 |
last_update | 2016-07-20 01:25:03 |
depth | 3 |
children | 1 |
net_rshares | 0 |
last_payout | 2016-08-23 13:10:57 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 SBD |
curator_payout_value | 0.000 SBD |
pending_payout_value | 0.000 SBD |
promoted | 0.000 SBD |
body_length | 33 |
author_reputation | 91,903,771,336,326 |
root_title | "Offline Attack on Steem User Credentials" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 SBD |
percent_steem_dollars | 10,000 |
Yes. 100% kosher = Good
post_id | 150,066 |
---|---|
author | robinhood |
permlink | re-liondani-re-robinhood-re-cryptogee-re-robinhood-offline-attack-on-steem-user-credentials-20160720t015033500z |
category | steem |
json_metadata | "{"tags": ["steem"]}" |
created | 2016-07-20 01:50:33 |
last_update | 2016-07-20 01:50:33 |
depth | 4 |
children | 0 |
net_rshares | 0 |
last_payout | 2016-08-23 13:10:57 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 SBD |
curator_payout_value | 0.000 SBD |
pending_payout_value | 0.000 SBD |
promoted | 0.000 SBD |
body_length | 28 |
author_reputation | 2,616,843,664,428 |
root_title | "Offline Attack on Steem User Credentials" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 SBD |
percent_steem_dollars | 10,000 |