Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If my password is catsanddogs, there is not much entropy in this password. If the connection was based off symmetric crypto from the get go, where the key was seeded from that password, you could capture some traffic and offline attack the key based off a weak user password.

The alternative is safer. You would have to brute force the login online.

I think you don't know what an IV is. The IV is not secret. Maybe that's where the confusion comes from?



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: