Basically, people will almost always leave either the key or a fragment of the key, "somewhere" on their harddrive. This can be totally unintentional, like using some highschool friend's name as a key, then having the name in an address book or old email somewhere. The distributed technique, will find every unique word in your filesystem, and using a "seti-style distributed attack", will try every word against your encrypted binary. This would also be useful in finding gpg-secret-key passwords.
In reply to Re: Simple Encryption question
by zentara
in thread Simple Encryption question
by Nik
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |