Author Topic: Interpol cracks passwords using hashcat  (Read 57 times)

INT

  • Darknet Newbie
  • *
  • Posts: 1
  • Karma: +0/-0
    • View Profile
Interpol cracks passwords using hashcat
« on: September 21, 2020, 05:51:17 PM »

Interpol uses hashcat in order to break the passwords that protect encrypted storage devices.

They have had 39% success breaking 32 passwords out of 91 where they needed to access encrypted data.

The unit taking care of password cracking received 5 million euros two years ago so their cracking array must be huge.

Now they want to go further by requesting companies access to end-to-end encrypted communications.

There are basically 6 ways to access encrypted data without directly breaking the encryption:

- find the key
- guess the key
- compel the key
- exploit a flaw in the encryption software
- access plaintext while the device is in use
- locate another plaintext copy

Source:

https://www.techdirt.com/articles/20200728/07235644992/eu-plans-to-use-supercomputers-to-break-encryption-also-wants-platforms-to-create-opportunities-to-snoop-end-to-end.shtml