After a password leak, is there a Levenshtein distance from which one a newly derivated password can be considered safe?

After a password leak, is there a Levenshtein distance from which one a newly derivated password can be considered safe?
I assume yes, given that if e.g. the word was "password", and the new one is "drowssap", the dista… Continue reading After a password leak, is there a Levenshtein distance from which one a newly derivated password can be considered safe?

Are dictionary and rainbow table attacks a subset of brute force attacks or are they seperate?

This is more of a question on the actual use of the terms rather than the definitions, so my question is this:
Are dictionary and rainbow table attacks a type of brute force attack or are they different entirely? Would it be okay to call a… Continue reading Are dictionary and rainbow table attacks a subset of brute force attacks or are they seperate?