- 2 Posts
- 5 Comments
UnpopularCrow@lemmy.worldto privacy@lemmy.ca•What is it with websites restricting passwords to 8 - 16 characters? Is there some technical limitation to their system??16·9 days agoIt’s usually shoddy (or intended?) coding that only allows a 16 byte length for the password. One character equals one byte of memory so my guess is they only allocated 16 bytes of space for the password. The irony is NIST 2025 recommendations argue for AT LEAST 15 characters for passwords.
UnpopularCrow@lemmy.worldto Technology@lemmy.world•Senator Reveals Which Phone Companies Protect Privacy by Telling Customers About Government Surveillance; Carriers Did Not Follow Through on Requirement to Notify Senate of Surveillance Demands.English3·18 days agoCape looks dope. Anyone have experience with their service?
UnpopularCrow@lemmy.worldto Technology@lemmy.world•Google's AI now listens to your English language phone conversationsEnglish15·23 days agoThe article claims that 1 trillion dollars was lost to scams in 2024 “based on research from GASA.org”. I cannot for the life of me figure out where this number comes from. Going to that website they say it’s based on ~58,000 surveys. I think they took the survey results, took the average amount of money the surveys claimed people lost and multiplied it by the total population of Earth or some nonsense shit. Their reports are blocked behind registration, which I’m not willing to do to find out their report is bullshit. Misinformation at its finest right here.
UnpopularCrow@lemmy.worldto Privacy@lemmy.ml•The EU Parliament has taken a stand for privacy | Proton0·2 years agoWhile this is good news, the fight for privacy in the digital age will never end. They will continue to take small bites until they have the entire pie. Unfortunately we never (or rarely) regain any digital right to privacy that has been taken in the past. The best we can do is halt the further erosion of our digital privacy through vigilance, education and protest.
Yea, you are correct. The database size should be based on the hashing algorithm.