Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork86
Increased ITERATIONS in decrypt_email.js#647
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
base:main
Are you sure you want to change the base?
Uh oh!
There was an error while loading.Please reload this page.
Conversation
…will lower the performace this is not a must to add but could be good
@Linkan333 is attempting to deploy a commit to theRevert Team onVercel. A member of the Team first needs toauthorize it. |
Hey there and thank you for opening this pull request! 👋🏼 |
Description
I increased the ITERATIONS variable in the decrypt_email.js file. This is because it could be usefull for Brute-Force Attacks to use PBKDF2 (Password-Bases Key Derivation Function 2). It could be bad for the performance on your website cause it will take longer time for each key to be generated.
For example at 100,000 iterations it might take ~100ms to derive a key. If you do the math with approximate 1 million password it would take ~27 hours on a single cpu to crack