You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,5 @@
1
+
# FilterPassword
2
+
[](https://github.com/FastFilter/FilterPassword/actions/workflows/ubuntu.yml)
1
3
2
4
## What is this?
3
5
@@ -11,7 +13,7 @@ The typical approach to this problem is to apply a Bloom filters. We test here a
11
13
12
14
We expect Linux or macOS.
13
15
14
-
Though the constructed filter may use only about a byte per set entry, the construction itself may need 64 bytes per entry (only during the construction process). A machine with much RAM is recommended.
16
+
Though the constructed filter may use only about a byte per set entry, the construction itself may need 64 bytes per entry (only during the construction process). A machine with much RAM is recommended when constructing large filters. It may be a good strategy to fragment your set and construct several smaller filters.
15
17
16
18
## Limitations
17
19
@@ -24,9 +26,13 @@ We support hundreds of millions of entries and more, if you have the available m
24
26
25
27
## Preparing the data file
26
28
29
+
For quick experiments, we provide a `sample.txt` file but if you want to simulate a realistic application, you need a password data file.
30
+
31
+
27
32
Grab password file from
28
33
https://haveibeenpwned.com/passwords
29
34
35
+
30
36
Most likely, you will download a 7z archive. On macOS, you can
31
37
uncompress it as follows assuming you are a brew user:
0 commit comments