On Fri, Dec 2, 2011 at 10:26 PM, Charles Morris <cmor...@cs.odu.edu> wrote:

> Valdis,
>
> > (For real fun, consider that published and unpublished works are treated
> differently.  And
> > a password list almost always becomes a published work without the
> permission of
> > the author(s) ;)
>
> Talking of currently implemented systems...
>
> One could argue that the author of lists resulting from cracked hashes
> is the cracker,
> as the cracker is simply computing one of the infinite collisions that
> each hash intrinsically has.
>
>
on a related note:
http://en.wikipedia.org/wiki/Illegal_number
http://en.wikipedia.org/wiki/Illegal_prime

-- 
Ferenc Kovács
@Tyr43l - http://tyrael.hu
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to