<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Qistoph</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Qistoph"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/Qistoph"/>
		<updated>2026-05-03T18:04:24Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1286:_Encryptic&amp;diff=51938</id>
		<title>1286: Encryptic</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1286:_Encryptic&amp;diff=51938"/>
				<updated>2013-11-05T13:54:54Z</updated>
		
		<summary type="html">&lt;p&gt;Qistoph: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1286&lt;br /&gt;
| date      = November 4, 2013&lt;br /&gt;
| title     = Encryptic&lt;br /&gt;
| image     = encryptic.png&lt;br /&gt;
| titletext = It was bound to happen eventually. This data theft will enable almost limitless [xkcd.com/792]-style password reuse attacks in the coming weeks. There's only one group that comes out of this looking smart: Everyone who pirated Photoshop.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
Web sites and other computers that authenticate users via passwords need to be able to know if the user typed in the right password.  But storing the password itself on the computer has been known to be unnecessarily risky since the publication of [http://www.neurosecurity.com/articles/security/passwd.pdf Password Security: A Case History] in 1978.  In that paper, Robert Morris and Ken Thompson demonstrated the practice of using a slow, cryptographically-secure one-way {{w|Hash function|hash function}}, so that even if the password file is stolen, it will be very hard to figure out what the passwords are, so long as the passwords themselves are suitably complex.  They also pioneered the use of {{w|Salt (cryptography)|a “salt”}} which makes each password hash completely different even if two users use the same password.  See [http://security.blogoverflow.com/2011/07/a-tour-of-password-questions-and-answers/ A tour of password questions and answers] for background on salts and suitably slow hash functions.&lt;br /&gt;
&lt;br /&gt;
Adobe, however, ignored these well-known principles, and instead stored over a hundred million passwords in a reversably encrypted way, using a terrible choice of encryption methods which exposes a great deal of information about the passwords, and does not involve a salt.  This password database was recently obtained by someone and released on the Internet.&lt;br /&gt;
&lt;br /&gt;
In particular, Adobe used {{w|Triple DES}}, an older encryption algorithm which can still be relatively secure when properly used but they used it improperly.  It works on 64-bit (8 character) blocks. Assuming that the passwords are stored in plain ASCII, this means that a sequence of 8 characters in a password which starts on a character position which is a multiple of eight is always encrypted to the same result.  Therefore two passwords starting with “12345678” would start with the same block after being encrypted. Furthermore, this means that you can actually get a very good idea of the length of the password since anything with only one block is a password with length between 1 and 8 characters, and having two blocks implies it has between 9 and 16 characters, etc.&lt;br /&gt;
&lt;br /&gt;
Adobe also stored hints users created for their passwords. That means that an attacker knows not only if the same 8 characters are used for multiple passwords but also has some hints for guessing them. That means that common password portions should be easy to recover and that any user may be “compromised” by someone else using a part of the same password and providing a good hint. As an example, a password having three hints “Big Apple”, “Twin Towers” and “If you can make it there” is probably “New York” (or a simple variation on that). The weakness here is that no decryption and therefore no hard cracking has to take place, you just group the passwords by their encrypted blocks and try to solve them like a crossword puzzle.  These weaknesses have already been used to presumably identify a password used by {{w|Edward Snowden}}, as discussed at [http://7habitsofhighlyeffectivehackers.blogspot.com/2013/11/can-someone-be-targeted-using-adobe.html 7 Habits of Highly Effective Hackers: Can someone be targeted using the Adobe breach?].&lt;br /&gt;
&lt;br /&gt;
The examples are not taken from the actual leaked file, since that [http://arstechnica.com/security/2013/11/how-an-epic-blunder-by-adobe-could-strengthen-hand-of-password-crackers/ uses a different format], and the examples are evidently cleverly crafted to make a nice crossword-like puzzle, which can be solved as shown in the Passwords section below.&lt;br /&gt;
&lt;br /&gt;
The title text makes a reference to a previous comic: [[792|Black Hat’s trouble with what to do with stolen passwords]]. It also states that users of pirated Photoshop are the winners here. This is because in order to make Photoshop pirate-able, it was modified (cracked) by removing the requirement for registration so their passwords were not sent to Adobe and therefore are not present in the leaked file.&lt;br /&gt;
&lt;br /&gt;
The title itself is a reference to [http://en.wikipedia.org/wiki/Cryptic_crossword cryptic crosswords]&lt;br /&gt;
&lt;br /&gt;
==Passwords==&lt;br /&gt;
Note that characters in the passwords could be upper or lower case, and they may involve common substitutions like &amp;quot;0&amp;quot; (number zero) for &amp;quot;O&amp;quot; (letter O); therefore, the clues cannot guarantee that the answer shown here is precisely correct.  Nevertheless, we have plenty of information for a brute force attack.&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Input&lt;br /&gt;
! Hint&lt;br /&gt;
! Password&lt;br /&gt;
! Explanation&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;lt;/tt&amp;gt;&lt;br /&gt;
|weather vane sword&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias&amp;lt;/tt&amp;gt;&lt;br /&gt;
|In ''Redwall'', several characters are associated with a sword hung from a weather vane, but only Matthias shares the name of an apostle (6 lines down).&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Although no hint was used, we know this password too, since it matches the previous one.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;amp;nbsp;a0a2876eb1ea1fca&amp;lt;/tt&amp;gt;&lt;br /&gt;
|name1&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Even without knowing the user's name, we already know how this starts, so the clue gives us a pretty good idea how it finishes (and another block useful 2 lines down)&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;8babb6299e06eb6d&amp;lt;/tt&amp;gt;&lt;br /&gt;
|duh&lt;br /&gt;
|&amp;lt;tt&amp;gt;password&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Unfortunately, this is all too common, and the user practically told us that it's an easy one.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;8babb6299e06eb6d&amp;amp;nbsp;a0a2876eb1ea1fca&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;password1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Although no hint was used, we know this by combining the previous two.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;8babb6299e06eb6d&amp;amp;nbsp;85e9da81a8a78adc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|57&lt;br /&gt;
|&amp;lt;tt&amp;gt;password57&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Since we know how this begins, this is a good guess.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;lt;/tt&amp;gt;&lt;br /&gt;
|favorite of 12 apostles&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This has only 12 possibilities to begin with (plus variant spellings, variant lists, and one replacement), but actually we know already which one by combining with the clue 6 lines up.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;1ab29ae86da6e5ca&amp;amp;nbsp;7a2d6a0a2876eb1e&amp;lt;/tt&amp;gt;&lt;br /&gt;
|with your own hand you have done all this&lt;br /&gt;
|&amp;lt;tt&amp;gt;Judith1510&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This is a quotation from Judith 15:10.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;a1f9b2b6299e7a2b&amp;amp;nbsp;eadec1e6ab797397&amp;lt;/tt&amp;gt;&lt;br /&gt;
|sexy earlobes&lt;br /&gt;
|&amp;lt;tt&amp;gt;Charlie&amp;amp;nbsp;Sheen&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This refers to an episode of ''Two and a Half Men''.  Other answers are possible, but only this one fits the next line.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;a1f9b2b6299e7a2b&amp;amp;nbsp;617ab0277727ad85&amp;lt;/tt&amp;gt;&lt;br /&gt;
|best TOS episode&lt;br /&gt;
|&amp;lt;tt&amp;gt;Charlie&amp;amp;nbsp;X&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&amp;quot;TOS&amp;quot; refers to the original series of ''Star Trek''.  Although this had dozens of episodes, only one fits the previous line as well as the next line.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;39738b7adb0b8af7&amp;amp;nbsp;617ab0277727ad85&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Sugarland&lt;br /&gt;
|&amp;lt;tt&amp;gt;HoustonTX&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Sugarland is a suburb of Houston, Texas.  This fits with the previous line.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;1ab29ae86da6e5ca&amp;lt;/tt&amp;gt;&lt;br /&gt;
|name + jersey#&lt;br /&gt;
|&amp;lt;tt&amp;gt;Judith15&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Even if we knew this user's name, we wouldn't know their jersey number.  But the clue 4 lines up already gave us the answer.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|alpha&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This password is also far too common, but this clue still isn't enough to narrow it down.  Combine with the clue 3 lines below, however, and it's quite easy.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|No hint, but the same as the surrounding passwords.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|No hint, but the same as the surrounding passwords.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|obvious&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Same as the surrounding passwords.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Michael Jackson&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Michael Jackson did many songs, but only one was alphabetical (3 lines up).&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;38a7c9279cadeb44&amp;amp;nbsp;9dca1d79d4dec6d5&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|No hint, but the same as the one below.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;38a7c9279cadeb44&amp;amp;nbsp;9dca1d79d4dec6d5&amp;lt;/tt&amp;gt;&lt;br /&gt;
|HE DID THE MASH, HE DID THE&lt;br /&gt;
|&amp;lt;tt&amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
|probably a reference to the {{w|Monster Mash}}&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;38a7c9279cadeb44&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Purloined&lt;br /&gt;
|&amp;lt;tt&amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;a8ae5754a2b7af7a&amp;amp;nbsp;9dca1d79d4dec6d5&amp;lt;/tt&amp;gt;&lt;br /&gt;
|fav water-3 Pokemon&lt;br /&gt;
|&amp;lt;tt&amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
|''possible second block per [http://bulbapedia.bulbagarden.net/wiki/Water_3_%28Egg_Group%29 Bulbapedia] are &amp;quot;el&amp;quot;, &amp;quot;l&amp;quot;, &amp;quot;le&amp;quot;, &amp;quot;r&amp;quot;, &amp;quot;t&amp;quot;, &amp;quot;ta&amp;quot;, &amp;quot;h&amp;quot;, &amp;quot;a&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:Hackers recently leaked '''''153 million''''' Adobe user emails, encrypted passwords, and password hints.&lt;br /&gt;
:Adobe encrypted the passwords improperly, misusing block-mode 3DES. The result is something wonderful:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
User password                      Hint&lt;br /&gt;
-------------                      ----&lt;br /&gt;
&lt;br /&gt;
4e18acc1ab27a2d6                   weather vane sword&lt;br /&gt;
4e18acc1ab27a2d6&lt;br /&gt;
4e18acc1ab27a2d6 a0a2876eb1ea1fca  name1&lt;br /&gt;
8babb6299e06eb6d                   duh&lt;br /&gt;
8babb6299e06eb6d a0a2876eb1ea1fca&lt;br /&gt;
8babb6299e06eb6d 85e9da81a8a78adc  57&lt;br /&gt;
4e18acc1ab27a2d6                   favorite of 12 apostles&lt;br /&gt;
1ab29ae86da6e5ca 7a2d6a0a2876eb1e  with your own hand you&lt;br /&gt;
                                   have done all this&lt;br /&gt;
a1f9b2b6299e7a2b eadec1e6ab797397  sexy earlobes&lt;br /&gt;
a1f9b2b6299e7a2b 617ab0277727ad85  best tos episode&lt;br /&gt;
39738b7adb0b8af7 617ab0277727ad85  sugarland&lt;br /&gt;
1ab29ae86da6e5ca                   name + jersey#&lt;br /&gt;
877ab7889d3862b1                   alpha&lt;br /&gt;
877ab7889d3862b1&lt;br /&gt;
877ab7889d3862b1&lt;br /&gt;
877ab7889d3862b1                   obvious&lt;br /&gt;
877ab7889d3862b1                   Michael Jackson&lt;br /&gt;
38a7c9279cadeb44 9dca1d79d4dec6d5&lt;br /&gt;
38a7c9279cadeb44 9dca1d79d4dec6d5  he did the mash, he did the&lt;br /&gt;
38a7c9279cadeb44                   Purloined&lt;br /&gt;
a8ae5754a2b7af7a 9dca1d79d4dec6d5  fav water-3 pokemon&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:The greatest crossword puzzle in the history of the world&lt;br /&gt;
&lt;br /&gt;
==Hidden message==&lt;br /&gt;
As mentioned on http://filosottile.github.io/analyzing-the-adobe-leaked-passwords/ the data isn't real and contains a hidden message.&lt;br /&gt;
Base64 encoded the data blocks (in specific order) read:&lt;br /&gt;
&amp;lt;pre&amp;gt;ThiswasnotagooduseofyourtimeButthenagainitwasprobablynotagooduseofmytimeeith&lt;br /&gt;
erAndyethereweareXOXOXOLetsLiveHereInThisTinySecretEncodedTextWorldUoreveg==&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;/div&gt;</summary>
		<author><name>Qistoph</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1286:_Encryptic&amp;diff=51935</id>
		<title>1286: Encryptic</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1286:_Encryptic&amp;diff=51935"/>
				<updated>2013-11-05T13:48:33Z</updated>
		
		<summary type="html">&lt;p&gt;Qistoph: Correct data block ending in 1fea to a0a2876eb1ea1fca&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1286&lt;br /&gt;
| date      = November 4, 2013&lt;br /&gt;
| title     = Encryptic&lt;br /&gt;
| image     = encryptic.png&lt;br /&gt;
| titletext = It was bound to happen eventually. This data theft will enable almost limitless [xkcd.com/792]-style password reuse attacks in the coming weeks. There's only one group that comes out of this looking smart: Everyone who pirated Photoshop.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
Web sites and other computers that authenticate users via passwords need to be able to know if the user typed in the right password.  But storing the password itself on the computer has been known to be unnecessarily risky since the publication of [http://www.neurosecurity.com/articles/security/passwd.pdf Password Security: A Case History] in 1978.  In that paper, Robert Morris and Ken Thompson demonstrated the practice of using a slow, cryptographically-secure one-way {{w|Hash function|hash function}}, so that even if the password file is stolen, it will be very hard to figure out what the passwords are, so long as the passwords themselves are suitably complex.  They also pioneered the use of {{w|Salt (cryptography)|a “salt”}} which makes each password hash completely different even if two users use the same password.  See [http://security.blogoverflow.com/2011/07/a-tour-of-password-questions-and-answers/ A tour of password questions and answers] for background on salts and suitably slow hash functions.&lt;br /&gt;
&lt;br /&gt;
Adobe, however, ignored these well-known principles, and instead stored over a hundred million passwords in a reversably encrypted way, using a terrible choice of encryption methods which exposes a great deal of information about the passwords, and does not involve a salt.  This password database was recently obtained by someone and released on the Internet.&lt;br /&gt;
&lt;br /&gt;
In particular, Adobe used {{w|Triple DES}}, an older encryption algorithm which can still be relatively secure when properly used but they used it improperly.  It works on 64-bit (8 character) blocks. Assuming that the passwords are stored in plain ASCII, this means that a sequence of 8 characters in a password which starts on a character position which is a multiple of eight is always encrypted to the same result.  Therefore two passwords starting with “12345678” would start with the same block after being encrypted. Furthermore, this means that you can actually get a very good idea of the length of the password since anything with only one block is a password with length between 1 and 8 characters, and having two blocks implies it has between 9 and 16 characters, etc.&lt;br /&gt;
&lt;br /&gt;
Adobe also stored hints users created for their passwords. That means that an attacker knows not only if the same 8 characters are used for multiple passwords but also has some hints for guessing them. That means that common password portions should be easy to recover and that any user may be “compromised” by someone else using a part of the same password and providing a good hint. As an example, a password having three hints “Big Apple”, “Twin Towers” and “If you can make it there” is probably “New York” (or a simple variation on that). The weakness here is that no decryption and therefore no hard cracking has to take place, you just group the passwords by their encrypted blocks and try to solve them like a crossword puzzle.  These weaknesses have already been used to presumably identify a password used by {{w|Edward Snowden}}, as discussed at [http://7habitsofhighlyeffectivehackers.blogspot.com/2013/11/can-someone-be-targeted-using-adobe.html 7 Habits of Highly Effective Hackers: Can someone be targeted using the Adobe breach?].&lt;br /&gt;
&lt;br /&gt;
The examples are not taken from the actual leaked file, since that [http://arstechnica.com/security/2013/11/how-an-epic-blunder-by-adobe-could-strengthen-hand-of-password-crackers/ uses a different format], and the examples are evidently cleverly crafted to make a nice crossword-like puzzle, which can be solved as shown in the Passwords section below.&lt;br /&gt;
&lt;br /&gt;
The title text makes a reference to a previous comic: [[792|Black Hat’s trouble with what to do with stolen passwords]]. It also states that users of pirated Photoshop are the winners here. This is because in order to make Photoshop pirate-able, it was modified (cracked) by removing the requirement for registration so their passwords were not sent to Adobe and therefore are not present in the leaked file.&lt;br /&gt;
&lt;br /&gt;
The title itself is a reference to [http://en.wikipedia.org/wiki/Cryptic_crossword cryptic crosswords]&lt;br /&gt;
&lt;br /&gt;
==Passwords==&lt;br /&gt;
Note that characters in the passwords could be upper or lower case, and they may involve common substitutions like &amp;quot;0&amp;quot; (number zero) for &amp;quot;O&amp;quot; (letter O); therefore, the clues cannot guarantee that the answer shown here is precisely correct.  Nevertheless, we have plenty of information for a brute force attack.&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Input&lt;br /&gt;
! Hint&lt;br /&gt;
! Password&lt;br /&gt;
! Explanation&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;lt;/tt&amp;gt;&lt;br /&gt;
|weather vane sword&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias&amp;lt;/tt&amp;gt;&lt;br /&gt;
|In ''Redwall'', several characters are associated with a sword hung from a weather vane, but only Matthias shares the name of an apostle (6 lines down).&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Although no hint was used, we know this password too, since it matches the previous one.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;amp;nbsp;a0a2876eb1ea1fca&amp;lt;/tt&amp;gt;&lt;br /&gt;
|name1&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Even without knowing the user's name, we already know how this starts, so the clue gives us a pretty good idea how it finishes (and another block useful 2 lines down)&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;8babb6299e06eb6d&amp;lt;/tt&amp;gt;&lt;br /&gt;
|duh&lt;br /&gt;
|&amp;lt;tt&amp;gt;password&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Unfortunately, this is all too common, and the user practically told us that it's an easy one.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;8babb6299e06eb6d&amp;amp;nbsp;a0a2876eb1ea1fca&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;password1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Although no hint was used, we know this by combining the previous two.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;8babb6299e06eb6d&amp;amp;nbsp;85e9da81a8a78adc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|57&lt;br /&gt;
|&amp;lt;tt&amp;gt;password57&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Since we know how this begins, this is a good guess.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;4e18acc1ab27a2d6&amp;lt;/tt&amp;gt;&lt;br /&gt;
|favorite of 12 apostles&lt;br /&gt;
|&amp;lt;tt&amp;gt;matthias&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This has only 12 possibilities to begin with (plus variant spellings, variant lists, and one replacement), but actually we know already which one by combining with the clue 6 lines up.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;1ab29ae86da6e5ca&amp;amp;nbsp;7a2d6a0a2876eb1e&amp;lt;/tt&amp;gt;&lt;br /&gt;
|with your own hand you have done all this&lt;br /&gt;
|&amp;lt;tt&amp;gt;Judith1510&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This is a quotation from Judith 15:10.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;a1f9b2b6299e7a2b&amp;amp;nbsp;eadec1e6ab797397&amp;lt;/tt&amp;gt;&lt;br /&gt;
|sexy earlobes&lt;br /&gt;
|&amp;lt;tt&amp;gt;Charlie&amp;amp;nbsp;Sheen&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This refers to an episode of ''Two and a Half Men''.  Other answers are possible, but only this one fits the next line.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;a1f9b2b6299e7a2b&amp;amp;nbsp;617ab0277727ad85&amp;lt;/tt&amp;gt;&lt;br /&gt;
|best TOS episode&lt;br /&gt;
|&amp;lt;tt&amp;gt;Charlie&amp;amp;nbsp;X&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&amp;quot;TOS&amp;quot; refers to the original series of ''Star Trek''.  Although this had dozens of episodes, only one fits the previous line as well as the next line.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;39738b7adb0b8af7&amp;amp;nbsp;617ab0277727ad85&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Sugarland&lt;br /&gt;
|&amp;lt;tt&amp;gt;HoustonTX&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Sugarland is a suburb of Houston, Texas.  This fits with the previous line.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;1ab29ae86da6e5ca&amp;lt;/tt&amp;gt;&lt;br /&gt;
|name + jersey#&lt;br /&gt;
|&amp;lt;tt&amp;gt;Judith15&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Even if we knew this user's name, we wouldn't know their jersey number.  But the clue 4 lines up already gave us the answer.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|alpha&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|This password is also far too common, but this clue still isn't enough to narrow it down.  Combine with the clue 3 lines below, however, and it's quite easy.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|No hint, but the same as the surrounding passwords.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|No hint, but the same as the surrounding passwords.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|obvious&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Same as the surrounding passwords.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;877ab7889d3862b1&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Michael Jackson&lt;br /&gt;
|&amp;lt;tt&amp;gt;abc&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Michael Jackson did many songs, but only one was alphabetical (3 lines up).&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;38a7c9279cadeb44&amp;amp;nbsp;9dca1d79d4dec6d5&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|No hint, but the same as the one below.&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;38a7c9279cadeb44&amp;amp;nbsp;9dca1d79d4dec6d5&amp;lt;/tt&amp;gt;&lt;br /&gt;
|HE DID THE MASH, HE DID THE&lt;br /&gt;
|&amp;lt;tt&amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
|probably a reference to the {{w|Monster Mash}}&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;38a7c9279cadeb44&amp;lt;/tt&amp;gt;&lt;br /&gt;
|Purloined&lt;br /&gt;
|&amp;lt;tt&amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&amp;lt;tt&amp;gt;a8ae5754a2b7af7a&amp;amp;nbsp;9dca1d79d4dec6d5&amp;lt;/tt&amp;gt;&lt;br /&gt;
|fav water-3 Pokemon&lt;br /&gt;
|&amp;lt;tt&amp;gt;&amp;lt;/tt&amp;gt;&lt;br /&gt;
|''possible second block per [http://bulbapedia.bulbagarden.net/wiki/Water_3_%28Egg_Group%29 Bulbapedia] are &amp;quot;el&amp;quot;, &amp;quot;l&amp;quot;, &amp;quot;le&amp;quot;, &amp;quot;r&amp;quot;, &amp;quot;t&amp;quot;, &amp;quot;ta&amp;quot;, &amp;quot;h&amp;quot;, &amp;quot;a&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:Hackers recently leaked '''''153 million''''' Adobe user emails, encrypted passwords, and password hints.&lt;br /&gt;
:Adobe encrypted the passwords improperly, misusing block-mode 3DES. The result is something wonderful:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
User password                      Hint&lt;br /&gt;
-------------                      ----&lt;br /&gt;
&lt;br /&gt;
4e18acc1ab27a2d6                   weather vane sword&lt;br /&gt;
4e18acc1ab27a2d6&lt;br /&gt;
4e18acc1ab27a2d6 a0a2876eb1ea1fca  name1&lt;br /&gt;
8babb6299e06eb6d                   duh&lt;br /&gt;
8babb6299e06eb6d a0a2876eb1ea1fca&lt;br /&gt;
8babb6299e06eb6d 85e9da81a8a78adc  57&lt;br /&gt;
4e18acc1ab27a2d6                   favorite of 12 apostles&lt;br /&gt;
1ab29ae86da6e5ca 7a2d6a0a2876eb1e  with your own hand you&lt;br /&gt;
                                   have done all this&lt;br /&gt;
a1f9b2b6299e7a2b eadec1e6ab797397  sexy earlobes&lt;br /&gt;
a1f9b2b6299e7a2b 617ab0277727ad85  best tos episode&lt;br /&gt;
39738b7adb0b8af7 617ab0277727ad85  sugarland&lt;br /&gt;
1ab29ae86da6e5ca                   name + jersey#&lt;br /&gt;
877ab7889d3862b1                   alpha&lt;br /&gt;
877ab7889d3862b1&lt;br /&gt;
877ab7889d3862b1&lt;br /&gt;
877ab7889d3862b1                   obvious&lt;br /&gt;
877ab7889d3862b1                   Michael Jackson&lt;br /&gt;
38a7c9279cadeb44 9dca1d79d4dec6d5&lt;br /&gt;
38a7c9279cadeb44 9dca1d79d4dec6d5  he did the mash, he did the&lt;br /&gt;
38a7c9279cadeb44                   Purloined&lt;br /&gt;
a8ae5754a2b7af7a 9dca1d79d4dec6d5  fav water-3 pokemon&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:The greatest crossword puzzle in the history of the world&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;/div&gt;</summary>
		<author><name>Qistoph</name></author>	</entry>

	</feed>