02-21-2019, 01:06 AM
I do not know what this value (Blockchain second password hash, salt, and iter_count in base 64 is.
password + salt
So I do not know the number of digits, I can not attack brute force. (It takes too much time)
There should be a reason why btc recovery has prepared a mechanism to issue this value (Blockchain second password hash, salt, and iter_count in base 64 . I want to investigate the reason.
password + salt
So I do not know the number of digits, I can not attack brute force. (It takes too much time)
There should be a reason why btc recovery has prepared a mechanism to issue this value (Blockchain second password hash, salt, and iter_count in base 64 . I want to investigate the reason.