This document discusses data storage and security strategies for network identity. It introduces the author and defines key terms. It outlines attacks on encrypted ciphertext, current solutions, criteria for suitable security products, and extra topics. Background topics covered include the impact of Moore's law on computation speed and available resources for attacks like cloud computing and botnets. Potential attacks analyzed include rainbow tables, password matching, and some incorrect methods. The document proposes the Antiy Password Mixer as an open-source solution and discusses design of slow hashes, biometric recognition, and other strategies.
Related topics: