1 Matching Annotations
- Apr 2020
Download the billions of breached passwords and blacklist them all. Attackers have a copy; so should you.
- think like your adversary
- passwords: compromised passwords
- assume that your adversary knows as much about the system you use as you do (Kerckhoffs's principle)
- data breaches