Zeitpunkt Nutzer Delta Tröts TNR Titel Version maxTL Fr 26.07.2024 00:01:07 61.958 +1 3.580.868 57,8 Fosstodon 4.2.10 500 Do 25.07.2024 00:00:10 61.957 +1 3.577.506 57,7 Fosstodon 4.2.10 500 Mi 24.07.2024 00:01:07 61.956 0 3.574.077 57,7 Fosstodon 4.2.10 500 Di 23.07.2024 00:00:03 61.956 -3 3.570.705 57,6 Fosstodon 4.2.10 500 Mo 22.07.2024 00:01:10 61.959 +1 3.567.825 57,6 Fosstodon 4.2.10 500 So 21.07.2024 00:01:07 61.958 +1 3.564.861 57,5 Fosstodon 4.2.10 500 Sa 20.07.2024 00:01:10 61.957 +1 3.561.604 57,5 Fosstodon 4.2.10 500 Fr 19.07.2024 13:57:34 61.956 -1 3.558.474 57,4 Fosstodon 4.2.10 500 Do 18.07.2024 00:00:27 61.957 +1 3.553.476 57,4 Fosstodon 4.2.10 500 Mi 17.07.2024 00:01:10 61.956 0 3.550.157 57,3 Fosstodon 4.2.10 500
Aaron Toponce ⚛️:debian: (@atoponce) · 05/2021 · Tröts: 6.256 · Folger: 2.795
Fr 26.07.2024 00:06
I've audited a lot of password generators. One thing I see come up occasionally is shuffling the source characters or word list before using a CSPRNG to pick one at random.
For example, something like (pseudocode):
chars = digits + lower + upper + symbols
chars.shuffle()
chars[rng.randint(0, chars.length - 1)]
Shuffling the source character set doesn't increase the entropy of the generation process.
A CSPRNG picking from an ordered list is just as random as one picking from a shuffled list.
[Öffentlich] Antw.: 0 Wtrl.: 0 Fav.: 0