Added a list of bad use cases.

This commit is contained in:
Douglas Muth 2019-11-22 17:09:22 -05:00
parent 4e56844e61
commit b3ffbcb831

View file

@ -207,6 +207,15 @@ I like passwords that I can remember.
</ul> </ul>
<h3>FAQ: What are some BAD use cases for Diceware?</h3>
You should not use Diceware in any cases where it is highly likely an attack can get a copy
of your encrypted password and use high-volume cracking attempts against it.
A bad case--possibly the worse case--for using Diceware would be to secure your BitCoint wallet,
because all BitCoin nodes have a copy of the BitCoin Ledger, and attacker
<a href="https://umanovskis.se/blog/post/leaky-faucet/">could attempt password cracking your wallet</a>.
<h3>"I can't believe you're sending passwords over the Internet!"</h3> <h3>"I can't believe you're sending passwords over the Internet!"</h3>
<a href="dude-chill-just-chill.gif">Chill</a>. I'm not. Passwords are generated within your browser and do not leave it (unless you copy them out yourself). <a href="dude-chill-just-chill.gif">Chill</a>. I'm not. Passwords are generated within your browser and do not leave it (unless you copy them out yourself).