Hacker News new | past | comments | ask | show | jobs | submit login

Simply cracking hashes that somebody else already leaked shouldn't be a crime and it's a common activity for network defenders and security researchers.

Some fundamental concepts used by defenders like "password strength" are subtly dependent upon the abilities of a putative attacker, yet we know that attackers are evolving their skills with every new breach. Thus in order for defenders to reason intelligently about their security and resolve the numerous trade-offs they face, we need data from the widest possible variety of sources when these real-world events occur.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: