Fit-Anything8352

Fit-Anything8352 t1_j9vsr3y wrote

It's not like anybody can do anything with the plates anyways. Those online reverse plate lookup websites don't work--they're scams. Obviously, because anyone walking by can see your plates too. OP is like going out of their way to give them a false sense of privacy.

1

Fit-Anything8352 t1_j2sos73 wrote

What? States do control the majority of functions in your daily life. Traffic laws, physical infrastructure, medical care, health insurance, water supply, electricity, education, etc. are all controlled by state law.

The federal government has very little say in anybody's day to day life.

2

Fit-Anything8352 t1_j2smwjt wrote

> Your argument is literally "all votes should be equal, but if everyone has equal votes that bad because rural populations get underrepresented".

The argument for the electoral college is "all states should have equal representation." The United States is a union of states, not a single state of 330 million people(the US is not Switzerland). If you vote by population, a state with a high population has more say in the election than one with a small population, it doesn't even have anything to do with urban vs rural.

5

Fit-Anything8352 t1_j2smd4w wrote

Or in other words "make the (variable size) voting population of each state have approximately equal representation in congress" which is exactly what I said. Because the United States is a union of states, not a giant singular unit of government.

The US isn't and was never intended to be a true democracy like Switzerland.

1

Fit-Anything8352 t1_j2sfx3a wrote

> Why would anyone in America think their vote should matter more than others?

Funny enough, that was actually motivation for the electoral college--because without it politicians would only campaign in California, New York, Florida, and Texas where the vast majority of the population lives. Or in other words, votes in large states would matter way more than votes in small states, regardless of political affiliation.

Funny right? That it wasn't completely arbitrary?

−9

Fit-Anything8352 t1_j1imutz wrote

It is impossible if they implemented the key derivation function correctly. If they used salt and used a slow enough KDF then you can't do dictionary or rainbow table attacks on the password, so you have to brute force the key. Which means the impossible task of brute forcing the equivalent of an 128-bit cipher

1

Fit-Anything8352 t1_j1im8js wrote

There is a quantum search algorithm called Grovers algorithm that lets you do a search with O(sqrt(N)) complexity which in other words means you an brute force an n-bit cipher in 2^n/2 operations. It requires way more sophisticated quantum computers than we have today though, with many more quibits and actual, working error correction.

> right... because it's "good enough" still and we've been told that for two decades and they sauce it daily. It was good enough for documents of the "secret" level... which is the level immediately above "given to the NYT for publishing"... in 2003.

It is good enough. Edward Snowden told us that in 2014 even the NSA didn't have any effective cryptanalysis on AES, and even on unrealistic future computers it would still take longer than the heat death of the universe to brute force it.

3

Fit-Anything8352 t1_j1hq4pp wrote

> So yeah, for most users there's not a ton of risk, but for anyone with PWs of less than 11ish characters and/or a low degree of entropy, everything they stored is at risk.

They were always at risk though, it was always incredibly stupid to use short master passwords, it's not like we didn't know that. People who ignored the warnings and did it anyway knew exactly what they were signing up for in the event or a breach.

2

Fit-Anything8352 t1_j1gn6fd wrote

I mean that's what I meant when I said "master password isn't something absolutely stupid."

That said, hopefully LastPass wasn't dumb enough to not use a key derivation function to derive the master key. The whole point of key derivation function is to make brute forcing passwords impractical by using an deliberately slow, computationally expensive hashing algorithm to derive the key from the password(say it takes like 100ms to compute on a very powerful computer). This effectively thwarts dictionary attacks, forcing the attacker back to "side step the key derivation function and just brute force the 256-bit key directly, without the database" which is again, impossible, even on future computers that don't exist.

Unless somebody discovers an effective, practical attack on full-round AES-256, which would be very impressive. But then you would have much bigger problems than your stupid passwords :)

5