tAdd README - hashcrush - Compute Argon2id hashes
 (HTM) git clone git://git.z3bra.org/hashcrush.git
 (DIR) Log
 (DIR) Files
 (DIR) Refs
 (DIR) README
       ---
 (DIR) commit 36245439c6ddc147c94d4cbd4ec110e7b91df903
 (DIR) parent c7dabc3eaf312f8edfc40961d34854b484431dee
 (HTM) Author: Willy Goiffon <contact@z3bra.org>
       Date:   Tue, 15 Aug 2023 12:24:32 +0200
       
       Add README
       
       Diffstat:
         A README                              |      57 +++++++++++++++++++++++++++++++
       
       1 file changed, 57 insertions(+), 0 deletions(-)
       ---
 (DIR) diff --git a/README b/README
       t@@ -0,0 +1,57 @@
       +                         Hello friend!
       +                         ~~~~~~~~~~~~~
       +
       +I need your help to build a database of passwords/hashes, because my
       +computer is crap and I cannot achieve this goal on my own, in a
       +reasonable amount of time.
       +
       +tl;dr
       +-----
       +        make -j $(nproc) COUNT=500000 (may take hours)
       +        curl -sT hashes.rec https://up.qw.is
       +
       +How?
       +----
       +
       +0. grab a wordlist suitable for diceware[0]
       +1. generate ${COUNT} random passwords (ideally >100000)
       +2. hash these password, with a randomly generated salt
       +3. format the output for ingestion by me
       +4. submit the file to https://up.qw.is
       +
       +For reference, 10K records account for ~1.3Mib. Considering a linear
       +grow rate, I will need at least 15,000,000 records, which would take
       +more than 2 months of it running full time on my own.
       +
       +The code is mostly shell scripts and a makefile.
       +Only exception is "hashgen", a program I wrote in go for hashing
       +passwords.
       +
       +All code is in public domain.
       +
       +Why?
       +----
       +Because I need a big database (>2Gib) of random argon2id hashes for a
       +side project I'm working on, so the more you can generate, the better.
       +
       +The passwords have a very high entropy, and every single password is
       +salted with a random salt on every loop, making this little experiment
       +totally useless to crack passwords in real life, so you're not
       +participating to a shady business here.
       +
       +Finally, it warms my heart to see strangers helping me out even though
       +the question is weird.
       +
       +
       +              You are awesome, don't change a thing.
       +              ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       +
       +
       +Dependency
       +----------
       +
       +- POSIX make
       +- go >= 1.19
       +- curl (only used to download the initial word list)
       +
       +[0]: https://en.wikipedia.org/wiki/Diceware