From b3ffbcb831dce51d170e9775650a43d1f6b5b917 Mon Sep 17 00:00:00 2001 From: Douglas Muth Date: Fri, 22 Nov 2019 17:09:22 -0500 Subject: [PATCH] Added a list of bad use cases. --- index.html | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/index.html b/index.html index 55c55c8..40a824c 100644 --- a/index.html +++ b/index.html @@ -207,6 +207,15 @@ I like passwords that I can remember. +

FAQ: What are some BAD use cases for Diceware?

+ +You should not use Diceware in any cases where it is highly likely an attack can get a copy +of your encrypted password and use high-volume cracking attempts against it. +A bad case--possibly the worse case--for using Diceware would be to secure your BitCoint wallet, +because all BitCoin nodes have a copy of the BitCoin Ledger, and attacker +could attempt password cracking your wallet. + +

"I can't believe you're sending passwords over the Internet!"

Chill. I'm not. Passwords are generated within your browser and do not leave it (unless you copy them out yourself).