zephyr@lemmy.worldM to linuxmemes@lemmy.world · 4 months ago-----BEGIN PRIVATE KEY-----lemmy.worldimagemessage-square77fedilinkarrow-up11.61Karrow-down120 cross-posted to: linux_memes@programming.dev
arrow-up11.59Karrow-down1image-----BEGIN PRIVATE KEY-----lemmy.worldzephyr@lemmy.worldM to linuxmemes@lemmy.world · 4 months agomessage-square77fedilink cross-posted to: linux_memes@programming.dev
minus-squaresus@programming.devlinkfedilinkarrow-up1·4 months agothe direct chain I can see is “can you string words to form a valid RSA key” “I would hope so, [xkcd about password strength]” “words are the least secure way to generate random bytes” “Good luck remembering random bytes. That infographic is about memorable passwords.” “You memorize your RSA keys?” so between comments 2 and 3 and 4 I’d say it soundly went past the handcrafted RSA key stuff.
the direct chain I can see is
“can you string words to form a valid RSA key”
“I would hope so, [xkcd about password strength]”
“words are the least secure way to generate random bytes”
“Good luck remembering random bytes. That infographic is about memorable passwords.”
“You memorize your RSA keys?”
so between comments 2 and 3 and 4 I’d say it soundly went past the handcrafted RSA key stuff.