Showing content from http://mail.python.org/pipermail/python-dev/attachments/20120221/3e6670a1/attachment.html below:
<br><br><div class="gmail_quote">On Tue, Feb 21, 2012 at 15:58, Xavier Morel <span dir="ltr"><<a href="mailto:python-dev@masklinn.net">python-dev@masklinn.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">On 2012-02-21, at 21:24 , Brett Cannon wrote:<br>
> On Tue, Feb 21, 2012 at 15:05, Barry Warsaw <<a href="mailto:barry@python.org">barry@python.org</a>> wrote:<br>
><br>
>> On Feb 21, 2012, at 02:58 PM, Benjamin Peterson wrote:<br>
>><br>
>>> 2012/2/21 Antoine Pitrou <<a href="mailto:solipsis@pitrou.net">solipsis@pitrou.net</a>>:<br>
>>>><br>
>>>> Hello,<br>
>>>><br>
>>>> Shouldn't it be enabled by default in 3.3?<br>
>><br>
>> Yes.<br>
>><br>
>>> Should you be able to disable it?<br>
>><br>
>> No, but you should be able to provide a seed.<br>
><br>
> I think that's inviting trouble if you can provide the seed. It leads to a<br>
> false sense of security in that providing some seed secures them instead of<br>
> just making it a tad harder for the attack.<br>
<br>
</div>I might have misunderstood something, but wouldn't providing a seed always<br>
make it *easier* for the attacker, compared to a randomized hash?<br></blockquote><div><br></div><div>Yes, that was what I was trying to convey. </div></div><br>
RetroSearch is an open source project built by @garambo
| Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4