22
you are viewing a single comment's thread
view the rest of the comments
[-] Redjard@lemmy.dbzer0.com 2 points 3 days ago

What is the threat szenario?
If you are smart about parallelization and have access to custom hardware, couldn't you turn 5 days into 1 hour or less?

[-] Markaos@lemmy.one 2 points 3 days ago

Yes, that's exactly the problem - there's nothing wrong with the encryption used, but it's IMHO incorrect to call it time-based when it's "work-based" and it just so happens that the specific computer doing the encryption works at a given speed.

I don't call my laptop's FDE time-based encryption just because I picked an encryption that takes it 10 seconds to decrypt the key.

this post was submitted on 30 Jun 2024
22 points (84.4% liked)

Open Source

28971 readers
424 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 4 years ago
MODERATORS