How do I assess the difficulty of brute-forcing combinations of some public information?

I’m designing a piece of software whose information will be public, but I’m wondering how resistant this information might be to external analysis, without using any specific security mechanisms to protect the information.

T… Continue reading How do I assess the difficulty of brute-forcing combinations of some public information?