You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Tim McClean flagged that users may be able to guess how correct their guesses are by measuring time of response.
Seems this might be difficult to actually exploit but we can add some non-blocking delays or otherwise do a full comparison.
The text was updated successfully, but these errors were encountered:
Why do you think this is difficult to exploit? afaik, this is exploit level "undergrad security 101 homework" — you time the responses and after enough of a distribution emerges you go to the next byte.
Tim McClean flagged that users may be able to guess how correct their guesses are by measuring time of response.
Seems this might be difficult to actually exploit but we can add some non-blocking delays or otherwise do a full comparison.
The text was updated successfully, but these errors were encountered: