It is brute force but you only have to scan a fraction of the data which makes it blazing fast. Unless your password is 30+ characters it isn’t going to take all that long, especially if you vaguely remember things such as the password length and if it contains certain numbers or not.
This video doesn’t prove that “encryption” is fast to crack, at all. The first part is literally just about trying millions of most commonly used passwords and the second “crack” relies on an insecure password. Also anyone who stores their most sensitive data in a ZIP file on Windows is doing it completely wrong. There are much better options than ZIP plus Microsoft likely already knows your password before you’re done encrypting your files because Windows probably key logged it.
I’m sorry, but do you have a source for it being that fast? I haven’t seen any mention of that anywhere else, at least when it comes to this area of encryption
You also don’t specify what kind of hardware would be needed to make that fast, how fast you’re thinking, or even what type of encryption you’re talking about, all of which are pretty important
I’m not sure this fact would make much of a difference here anyway, because it’s not like you’re ever scanning the entire disk in the first place, you’re trying to decrypt a specific string in the header in a specific place even if you’re just unlocking it normally, and if that really was so insecure, it would be pretty well known and nobody would ever use it
It is brute force but you only have to scan a fraction of the data which makes it blazing fast. Unless your password is 30+ characters it isn’t going to take all that long, especially if you vaguely remember things such as the password length and if it contains certain numbers or not.
First time seeing this, can you elaborate and post some sources?
aha, yay! I found it. https://youtu.be/tpoPdlBr_Gk
This video doesn’t prove that “encryption” is fast to crack, at all. The first part is literally just about trying millions of most commonly used passwords and the second “crack” relies on an insecure password. Also anyone who stores their most sensitive data in a ZIP file on Windows is doing it completely wrong. There are much better options than ZIP plus Microsoft likely already knows your password before you’re done encrypting your files because Windows probably key logged it.
I found a YouTube link in your comment. Here are links to the same video on alternative frontends that protect your privacy:
I’m sorry, but do you have a source for it being that fast? I haven’t seen any mention of that anywhere else, at least when it comes to this area of encryption
You also don’t specify what kind of hardware would be needed to make that fast, how fast you’re thinking, or even what type of encryption you’re talking about, all of which are pretty important
I’m not sure this fact would make much of a difference here anyway, because it’s not like you’re ever scanning the entire disk in the first place, you’re trying to decrypt a specific string in the header in a specific place even if you’re just unlocking it normally, and if that really was so insecure, it would be pretty well known and nobody would ever use it
With an alphabet of 50 characters, there’s 15 billion 6 character passwords, and 250 quintillion 12 characrer passwords; that’s anything but fast