To prevent any collision from happening, all that is needed is to prefix the generated random key with some unique information, such as the computer name and the date/time. Then a random collision becomes impossible and a brute-force attack mandated. With longer, variable-length secrets and broader selection of characters, the chance of such an attack succeeding are sufficiently remote as to be safely ignored in most situations.
A thought it was secure ?
in Sync General Discussion
Posted
To prevent any collision from happening, all that is needed is to prefix the generated random key with some unique information, such as the computer name and the date/time. Then a random collision becomes impossible and a brute-force attack mandated. With longer, variable-length secrets and broader selection of characters, the chance of such an attack succeeding are sufficiently remote as to be safely ignored in most situations.
Paul