heylogin hat dies direkt geteilt
How can I protect myself from brute force attacks? heyogin got you covered. So it's already built in our security architecture. But let's look at legacy password managers first. An attacker needs to steal the password vault by breaking into the cloud infrastructure. For this, the attacker typically uses a vulnerability in a remote attack. Second, the attacker can now brute force the master password of the vault in their own cloud by trying infinite combinations of this password. So, for example, cracking a 12 character master password costs around 100 U.S. dollars on average. In contrast, heylogin is secure against offline brute force attacks. Even if the attacker steals the vault in a remote attack, he also needs to physically steal the phone. In the second step. So to actually decrypt the password vault he also needs the pin. This means to scale this attack, he would need to steal all customer phones physically, and he needs to guess the correct Pin for each phone, which is limited to nine tries by the security chip of each phone. This makes the attack highly unrealistic. #bruteforce #heylogin #attack #pin #security