hmm interesting ... i did not know that ... this makes a lot of posts more easy to understand. He did provide sources of his software.. forum members have even reverse engineered his software and algorithm before that. I've tested his software , and used many actually used passwords, did a heuristic brute force attack, i was impressed. Of course i don't believe that the current algorithms will soon be broken, but if i look at the passwords that people actually use, the success rating with a mentioned attack is very serious. 64 chars is nice, but is not something most people use, any sysadm can confirm that, they simply can't remember that. And so they use very simple techniques to be able to remember these passwords. (just a few heuristic rules) So if they use a password of 6 to 8 chars like most do, A Cascade cipher like this, will certainly make it more difficult for these attacks. A good example is a company that provides his coworkers with TrueCrypt on their notebooks, guess what the average password length was ..