mirror of
https://github.com/dmuth/diceware.git
synced 2024-11-21 08:26:29 -05:00
Added a list of bad use cases.
This commit is contained in:
parent
4e56844e61
commit
b3ffbcb831
1 changed files with 9 additions and 0 deletions
|
@ -207,6 +207,15 @@ I like passwords that I can remember.
|
|||
</ul>
|
||||
|
||||
|
||||
<h3>FAQ: What are some BAD use cases for Diceware?</h3>
|
||||
|
||||
You should not use Diceware in any cases where it is highly likely an attack can get a copy
|
||||
of your encrypted password and use high-volume cracking attempts against it.
|
||||
A bad case--possibly the worse case--for using Diceware would be to secure your BitCoint wallet,
|
||||
because all BitCoin nodes have a copy of the BitCoin Ledger, and attacker
|
||||
<a href="https://umanovskis.se/blog/post/leaky-faucet/">could attempt password cracking your wallet</a>.
|
||||
|
||||
|
||||
<h3>"I can't believe you're sending passwords over the Internet!"</h3>
|
||||
|
||||
<a href="dude-chill-just-chill.gif">Chill</a>. I'm not. Passwords are generated within your browser and do not leave it (unless you copy them out yourself).
|
||||
|
|
Loading…
Reference in a new issue