diff -r f10d905e947f -r f7aa15984301 handouts/ho01.tex --- a/handouts/ho01.tex Mon Sep 29 17:43:35 2014 +0100 +++ b/handouts/ho01.tex Mon Sep 29 21:11:06 2014 +0100 @@ -554,7 +554,7 @@ (especially if the database contains millions of entries). If we use no salt or one global salt, all hash-values will be the same for this password. So if a hacker is in the business of -cracking as much passwords as possible, then it is a good idea +cracking as many passwords as possible, then it is a good idea to concentrate on those very popular passwords. This is not possible if each password gets its own salt: since we assume the salt is generated randomly, each version of \pcode{123456}