Poll

What is your main sona?

House Cat
71 (7.7%)
Big Cat
25 (2.7%)
General Dog
24 (2.6%)
Wolf
68 (7.3%)
Fox
92 (9.9%)
Snake
5 (0.5%)
Naga
4 (0.4%)
Lizard
8 (0.9%)
Dragon
55 (5.9%)
Horse
5 (0.5%)
Deer
6 (0.6%)
General Bird
17 (1.8%)
Gryphon
11 (1.2%)
Bat
5 (0.5%)
Otter
10 (1.1%)
Rabbit
7 (0.8%)
Frog
3 (0.3%)
Shark
16 (1.7%)
Whale
7 (0.8%)
Raptor
8 (0.9%)
Owl
8 (0.9%)
Goo Creature
22 (2.4%)
Rubber Creature
3 (0.3%)
Latex Creature
31 (3.3%)
Bear
14 (1.5%)
Weasel
3 (0.3%)
Ferret
10 (1.1%)
Sergal
7 (0.8%)
Camel
12 (1.3%)
DeadFur
18 (1.9%)
Human
352 (38%)

Total Members Voted: 923

Author Topic: Furry Megathread - Furry Things Here  (Read 5200314 times)

Claiming they salt them doesn't mean they actually do it properly



Granted, the key word here is "allegedly"
but knowing FA I wouldn't put it past them
« Last Edit: May 24, 2016, 07:24:08 PM by Headcrab Zombie »

Also salting hashes doesn't do very much in a situation like this. It can help when only a database is breached, since the attackers may not know what the salt is or how it's used. However, in this case the entirety of FA's source code was stolen, so they most likely would have figured out what the salt was anyways if they used one.
each user should have their own unique salt, which is stored in the database like all of the other user information. having the source code won't help you any if the hashes are salted properly. and it's not supposed to prevent brute forcing (although it may make it slightly slower), it's intended to prevent you from using rainbow tables

Claiming they salt them doesn't mean they actually do it properly



Granted, the key word here is "allegedly"
but knowing FA I wouldn't put it past them
I'd like to see the source for this rofl

I'd like to see the source for this rofl
I don't have a source that that's the actual exact code
But there's an onion site that shows who has same passwords:



The first same password account is "Nipnip" (some silly joke name I made for some reason) and the second is of course "Adam487" All three are my accounts,  and all three have the same password.

Now,  if passwords were salted, how would they know these have the same password? They would have to individually brute force every single user's password hash. Not viable.

Conclusion: passwords are not salted




Also salting hashes doesn't do very much in a situation like this. It can help when only a database is breached, since the attackers may not know what the salt is or how it's used. However, in this case the entirety of FA's source code was stolen, so they most likely would have figured out what the salt was anyways if they used one.
I don't think you know what salt is. Salt is a) randomized per user,  not hard coded, and b) stored plain text in the user table. It's not an encryption key, it doesn't need to be secret, that's not it's purpose.  You append it to the user's password before hashing, and since each user has a unique salt, even users with the same password will have different hashes. This stops rainbow tables from working; you'd need to compute a separate rainbow table for every salt.
(So yeah,  what Fox said. ..)
« Last Edit: May 25, 2016, 02:27:37 PM by Headcrab Zombie »


God, if it weren't for the jpeg, that pic would be priceless

Hey guys wanna yiff???

forget me harder
forget me better
forget me faster
forget me stronger

forget me harder
forget me better
forget me faster
forget me stronger

Bad  :panda:




>blue
>on a fox
Eww
there's about to be blue on ur face if u don't shut up



but huskies aren't orange!!!