Nice of you.
Nice of you.


That’s why it’s not brute force anymore.


I’m perfectly aware anything can be brute forced and that’s why it doesn’t worth to mention. Now, the amount of resources required to brute force a hashed password has nothing to do with the complexity of the password. No matter what the password is, the hash will have a fixed length and appear as a random sequence of bytes. Otherwise you are not doing it properly.
The complexity of the password has something to do with guessing the password from dictionary or known most common passwords.


As far as I know, the passwords aren’t stored in the databases, it’s the hash produced by a one-way function that is stored in the database. Grabbing these is useless.


Perfect!
OMG! Yes!
That’s not the LLM that understand your encoded string, it’s simply a preprocessing filter recognizing the signature of a base64 encoded string that decodes it and pass it back to the LLM.