nostr:npub15fkerqqyp9mlh7n8xd6d5k9s27etuvaarvnp2vqed83dw9c603pqs5j9gr talking about systems with access control usually isn't relevant when talking about password cracking. Only really interesting when they have the hash on a local disk.

I mean, that's basically a non-problem. They somehow got my encrypted file without otherwise compromising me, and know enough about the encryption scheme to try attacking it? Like, I lost a floppy disk and the disk has "encrypted with X" written on it or something

I'm sure there's stuff you can determine by inspection of the encrypted data, but not with much certainty

Reply to this note

Please Login to reply.

Discussion

I'm ignoring stuff like attacking le blockchain because that's not in the same realm as mary sue's password for her secret recipe book

nostr:npub15fkerqqyp9mlh7n8xd6d5k9s27etuvaarvnp2vqed83dw9c603pqs5j9gr there aren't that many schemes available so not knowing it would increase the complexity by maybe 20, so not as secure then knowing the scheme and just adding another character.

I am not entirely sure but I think that most encryption schemas just say what they are up front. The ones that don't are called Deniable. The only product I know that hides this is veracrypt.