Before I begin, I have to say that this post includes links to an instance, ani.social, that has been defederated from this instance, lemmy.ml, because that's where I discovered this problem.
But in this case, I hope the admins understand that this is worth reporting and investigating, and don't insta-delete this post, because this problem appears to happen with more than that one instance, including sopuli.xyz, which is not defederated from here at lemmy.ml
Let us begin:
With Lemmy account setting “Auto Expand Media” turned on, when I’m viewing community https://ani.social/c/ukraine@sopuli.xyz on my desktop browser, Firefox on Windows, one particular post, https://ani.social/post/1923262 , causes the /c view to ask me to download an .mp4 video from streamable.com:
After declining the download, the space where the thumbnail for the expanded media goes is just blank.
This doesn’t happen when viewing the same /c on .ml https://lemmy.ml/c/ukraine@sopuli.xyz
On .ml, I just get a clickable thumbnail of the video.
It’s just that one post.
On other earlier and later posts of links to streamable.com videos in the same /c, I just get the expected clickable thumbnail.
Maybe some kind of corrupted data as that particular post was transferring over?
When I asked about this on ani.social's meta /c, another user reported the auto-download request on ani.social, sopuli.xyz (the /c's home!) but not on lemmy.ml and lemmy.world
You're describing the best case scenario for the person wishing to protect their password, where the Planck Cruncher guesses the password on the very last possible combination, taking 100 years to get there.
The Planck Cruncher might guess the password correctly on the first try, or it might guess correctly on the last possible combination in 100 years.
What we really want to measure are the odds of a random guess being correct.
The most "realistic" scenario is the Planck Cruncher guessing correctly somewhere between 0 and 100 years, but you want to adjust the length of the password to be secure against a powerful attack during the realistic life of whatever system you're trying to protect.
On average, assuming the rate of password testing is constant, it'll take the Planck Cruncher 50 years to guess the 121 character password.
And that assumes the password never changes.
If the password is changed while the Planck Cruncher is doing its thing, and it changes to something that the PC has already guessed and tested negative, the PC is screwed.
~~Hint: Change your password regularly.~~ edit: The user should change their password regularly during the attack.
Each password change reduces the risk of a lucky guess by that many years of PC attack.