Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Quoting directly:

> the 100,000 PBKDF2 iterations on the server side are only applied to the master password hash, not to the encryption key

The attacker doesn’t need to break the master password hash, so it’s irrelevant. This is elaborated in the link directly following the above quote:

> But that protection only works if the attackers are stupid enough to verify their master password guesses via the authentication hash.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: