Can IPFS crack passwords (i.e. help an attacker guess a password of which only a hash is known)? #37
Comments
|
Actually No, the plaintext file is wrapped with metadata so the hash changes. And this is silly:
If someone deliberately puts the pwd out like that, they could just as well tweet it out and tag you personally. Maybe ask first before asserting one way or another? |
Sorry, I've misunderstood the dependence of that hash from the file's contents. I've edited my original (wrong) answer and added a strikethrough to indicate the misunderstanding. By the way, what are the elements of metadata that affect the hash? For example, does the hash change if a file is renamed? |
|
…I've just |
|
if you do you will not get the hash of |
|
Ah, I see. I get it. It's not even a hash of that file's content. It's a hash of an object that has links and blocks and whatnot. |
|
yep, thanks for editing |
Mithgol commentedSep 15, 2015
(inspired by Greg Slepak)
Yes: if a known hash is a multihash and if a text file containing the password (and only the password) was ever published, then a mere IPFS lookup will return the password in plain text form.Even if the login's owner have not ever published the password, such file may eventually be published by someone else.Update: no, the hash is actually more complex; see below.
The text was updated successfully, but these errors were encountered: