here's
a design in recognition of the
stratfor compromise. i didn't use the actual passwords from the analysis of that compromise, however, because that would be awfully narrowly focused. instead i used the
25 worst for all of 2011. that way it can just as easily apply to the next breach, and the one after that, and the one after that.
0 comments:
Post a Comment