Update I have come to a decision. Thank you to all who contributed suggestions. Please feel free to keep the discussion going to help others.
Update I have come to a decision. Thank you to all who contributed suggestions. Please feel free to keep the discussion going to help others.
I did quite some reading in my time, as I mentioned. The methods you are describing are riddled with ifs and buts. The reality is that even online systems arent hacked if they dont have obvious flaws like passwords in root ssh. on the other hand tools like john the ripper can break each and every common encryption given the right circumstances. Its no difference. Its all just marketing.