in reply to Simple Encryption question
Basically, people will almost always leave either the key or a fragment of the key, "somewhere" on their harddrive. This can be totally unintentional, like using some highschool friend's name as a key, then having the name in an address book or old email somewhere. The distributed technique, will find every unique word in your filesystem, and using a "seti-style distributed attack", will try every word against your encrypted binary. This would also be useful in finding gpg-secret-key passwords.
|
|---|