Je hebt een klacht over de onderstaande posting:
Bij de 1Password test is de oude versie van de database gebruikt. Elcomsoft heeft inmiddels de excuses aangeboden aan Agilebits en ook het rapport aangepast. https://blog.elcomsoft.com/2017/08/attacking-the-1password-master-password-follow-up/ Er is nu sprake van de volgende waarneming (Citaat): "We bring our apologies to AgileBits, the developers of 1Password, for letting the wrong number creep in to our benchmark. Can we still break into 1Password by attacking the master password? Please bear with us for up-to-date information and detailed technical discussion." "Long story short, we re-run the benchmark using the latest 1Password 6.8. Now it uses PBKDF2-HMAC-SHA512; iOS version database (extracted from iTunes backup) has 100,000 rounds, while DropBox-synced file opted for 60,000 rounds on our test iPhone 6S (hard to say how much iterations you will get, for example, when syncing older/slower iPhone models, but you can check that yourself, that’s pretty easy). With these parameters, we came up with ...
Beschrijf je klacht (Optioneel):