Computer historians crack passwords of Unix's early pioneers

What’s really interesting is you could then look for other places this pw was used… doing a hash in that direction is fine. this technique has been used to track APT actors

2 Likes