here's
a design in recognition of the
stratfor compromise. i didn't use the actual passwords from the analysis of that compromise, however, because that would be awfully narrowly focused. instead i used the
25 worst for all of 2011. that way it can just as easily apply to the next breach, and the one after that, and the one after that.
No comments:
Post a Comment