Turns out making a password recovery program 5 - 8 times faster isn’t enough for it to pose a threat.
Tested: Does Ampere Make Password Crackers Useful? : Read more
Tested: Does Ampere Make Password Crackers Useful? : Read more
The scheduled forum maintenance has now been completed. If you spot any issues, please report them here in this thread. Thank you!
A PR blast went out from the company. This is not the type of PR coverage they're looking for, of course, because we just showed that it's basically a scummy program. And we then took time to provide a PSA effectively saying, "Make sure you use strong passwords." We debated coverage vs. no coverage, and felt that not covering it didn't mean the information wouldn't get out to the people who would use this sort of program, and second we could provide some real-world testing with a 30-series GPU and discuss our findings. We did both.Why is this even an article on what is supposed to be a reputable tech site? In the past we'd have likely deleted any post like this that came up in the forums. The fact that it's not actually IN the forums, shouldn't make much difference. It's bad form.
Tom's Hardware, successfully going downhill since 1996!The quality of articles on this site has taken a real dive lately... you'd think the poster would understand some very basics of hashing, such as the difference between hash collisions and rainbow tables. Good job misinforming your readers.
It's really not that much faster. Eight times faster than before? That's nothing. One extra character on a password is potentially 96X more complex. The real question is whether or not quantum computing will come along in a practical form and make all of these old-style password schemes pointless. I have my doubts -- serious doubts -- that will ever actually happen, at least in my lifetime, for many reasons. One of the big ones: Google, IBM, Intel, etc. don't want to churn out hardware that will make everything insecure. If QC actually is excellent at breaking passwords, big corporations will keep it out of the public until new security mechanisms are in place. That's my bet. Plus, while QC will be good for certain tasks, even if it's a million times faster at cracking passwords than current PCs ... well, you just make your algorithm 30 bits longer, or add six characters, and it's back to being effectively unsolvable.Fair enough, but it might have been a lot more palatable to have EARLY in the article, alluded to the fact that the piece was written more for making the point that the software (Which most wouldn't have ever heard of anyhow unless they were already intending nefarious behavior, but now, assuredly, a whole new generation of wannabe kiddie hackers is aware of it) was "scummy and scammy" rather than what it APPEARS to be, which is that these GPUs are powerful and better able to take advantage of illicit software that previously wasn't very effective because it took so long to use, but now works much faster. Not sure I'm convinced either way, and I guess it doesn't really matter what I think, but it IS my opinion, and obviously it's shared as it was discussed elsewhere already anyhow along with some comments here that were in line with those opinions as well.
But as I said, fair enough. Plausible deniability and all that.
It's really not that much faster. Eight times faster than before? That's nothing. One extra character on a password is potentially 96X more complex. The real question is whether or not quantum computing will come along in a practical form and make all of these old-style password schemes pointless. I have my doubts -- serious doubts -- that will ever actually happen, at least in my lifetime, for many reasons. One of the big ones: Google, IBM, Intel, etc. don't want to churn out hardware that will make everything insecure. If QC actually is excellent at breaking passwords, big corporations will keep it out of the public until new security mechanisms are in place. That's my bet. Plus, while QC will be good for certain tasks, even if it's a million times faster at cracking passwords than current PCs ... well, you just make your algorithm 30 bits longer, or add six characters, and it's back to being effectively unsolvable.
I also sit firmly in the camp of not trying to hide things from people. The 'bad people' wanting to use password crackers are surely already aware of tools that are far more damaging the Passcovery. If someone first learns of it here and ultimately tries to put it to use for nefarious purposes ... I'm not feeling very threatened by such a user. "Tom's Hardware says this thing isn't very good at cracking passwords. I'll show them!"
if QC actually is excellent at breaking passwords, big corporations will keep it out of the public until new security mechanisms are in place.
Hello, Jarred.The basic PR is about how awesome Passcovery is and how it can crack a Word document password in about two hours.
Well, good example here. If your wife completely forgot the password then, yeah, it's over. However, if she's somehow able to remember just 3 first letters out of that then (no, you don't run "default scenario" and tell people "They are all scammers!" after 2 hours) you're (or she's in fact) carefully calculating your chances to brute-force the rest of the password. You're need to know what you're doing after all if you're using strong passwords! Password recovery wizard within PSuite shows ETA immediately as you're changing attack settings. Yes, no point to wait for 140 years but... if it's only a year?I have a password protected Word document where I write down all my passwords for important stuff, in case I ever die and my wife needs to get access. She's forgotten the password and existence of this file many times, sadly, so I'm not sure it will help her much in the event of my demise.
I swear there was something on the Passcovery Suite page or news post where it said "recovers most Word passwords in about two hours" or something to that effect. Because I remember thinking, "Wait, I've got a 3080 and it's estimating two hours -- most people aren't going to have a 3080!" But if that text was present before, it's been scrubbed now. (Do note that I did the performance testing but didn't write this article. I'm just active in the comments. ;-))First question. Can you please point out to/quote original PR where it states about " it can crack a Word document password in about two hours"? I'm technician inside Passcovery and don't pay much attention to our PRs (is it bad? Don't think so). Anyway, if it was really stated in PR in exactly these words -- it was wrong. But I can't find such statement right now. From the other hand, if you've created test archive, started Passcovery Suite, selected your archive, selected "Default Attack Scenario", pressed "Start", seen message "Password range is defined and attack has been started. If password belongs to this range it'll be found otherwise you'll need to extend password range taking into consideration practical limits based on password recovery speed", seen ETA 2 hours and somehow figured out from this that after 2 hours your password will be 100% recovered -- it's completely different story.
I get that it's a potentially useful service in a very loose sense ... and also a service that can very much be put to nefarious use. It costs a lot, people can use it to do bad things, and you're screwed if you forget a strong password. Which to me reeks of scummy / scammy software -- the scam part being where I read somewhere about how it could recover a password in a relatively short time, when that's only if people use weak passwords.Yes, strong passwords are impossible to crack. It was the case 10 years ago, 20 years ago (when I've started with this area) and it'll be the case for nearest 10+ years as well. No miracles here. However, problem with 2020 is that people are way too lazy to understand how things/software works and way too judgmental as well. It took you like... 30 minutes to end with "scummy and scammy software". Really nice editorial work! Why bother with technical details when you simply can call it "scam"?
I'll explain you in simpler terms what Passcovery PR's was about:
Well, good example here. If your wife completely forgot the password then, yeah, it's over. However, if she's somehow able to remember just 3 first letters out of that then (no, you don't run "default scenario" and tell people "They are all scammers!" after 2 hours) you're (or she's in fact) carefully calculating your chances to brute-force the rest of the password. You're need to know what you're doing after all if you're using strong passwords! Password recovery wizard within PSuite shows ETA immediately as you're changing attack settings. Yes, no point to wait for 140 years but... if it's only a year?
- Our software now supports Ampere GPUs (sm_80 & sm_86).
- Password recovery speed for zip/classic archives became much higher for all NVIDIA GPUs. Not just 30x0.
- That "gap" and "blasphemy" words from PR screenshots are belongs only to 16-bit hashes from Office files, not relevant for any other schemes.
- That's all. Nothing about "with 3090 you now can do ..." Nope, you can't do anything with 3090 that you was able to do with 2080 2 years ago. Or even HD5990 7+ years ago.
It called "recovery" not as "euphemism" for "cracking". You can't crack a strong password used in properly designed protection scheme. Period. But you can recover it if you have some knowledge about this password by using more advanced methods rather than just typing all passwords one by one by hand.
The thing I agree with -- default scenario attacks must be improved, so more "simple" passwords will be recovered without any user interactions. However, this will increase default attack time which at some point ends as "This scummy software worked twice as long as previous version but still hasn't recovered my password!!!" Well, yeah, bad, bad software...
I swear there was something on the Passcovery Suite page or news post where it said "recovers most Word passwords in about two hours" or something to that effect. Because I remember thinking, "Wait, I've got a 3080 and it's estimating two hours -- most people aren't going to have a 3080!" But if that text was present before, it's been scrubbed now. (Do note that I did the performance testing but didn't write this article. I'm just active in the comments. ;-))