04-21-2021, 05:41 AM
I meant exotic optimization methods like new situation-specific optimized kernels. Pulling down the length of passwords and editing or ordering the keyspace of an attack should be relatively simple optimization, though as seen, it's a little difficult for other reasons, even though its conceptually simple. It doesn't require much in terms of writing code, just a fair amount of resources if you want to do certain things, especially the most straightforward way.