Better atmosphere, temperature, and water in the above run could add another 1k, so it seems that the maximum is at least 13k, though I suspect it is higher.
Some of us graybeards use to use teletypes to talk to our computers. In one of the earlier races between differing I/O, the printer couldn't print as fast as the teletype was receiving data, so the teletype would send XOFF (Ctrl-S) to tell the remote end "Stop sending data and let me catch up" and would then send XON (Ctrl-Q) to say "I'm caught up, go back to sending data.
Many of us carried that to our VT100 terminals and used it when lines of code or output would flood the screen faster than we could read.
Eventually paginators like 'more' and 'less' were invented and flow control via the keyboard codes for XON/XOFF fell out of favor, but some of us have very strong muscle memory. :)
A fine answer, but my life experience is that it's not just "muscle memory," I am showing that xon and xoff still work inside both Terminal.app and iTerm2 (echo $TERM shows "xterm-256color") so maybe there's some legacy stuff configured in them or something, but I'm just saying that I struggle to think of who the audience is that would be running micro but not via a virtual terminal library that implements flow control
I'm terribly disappointed that this community of thoughtful, interesting bakers can't seem to effectively discuss the topic of whether or not beans belong in chili.
It's been well over a decade since I last used a Palm device, and yet my printing still slips into Graffiti, notably the horizontal trail at the end for the letter V.
So they're brute forcing the master password for these databases. Why should I be worried if I'm using a non-dictionary multi-word passphrase as my master password?
"Different password managers employ different approaches to security. As an example, LastPass generates the encryption key by hashing the username and master password with 5,000 rounds of PBKDF2-SHA256, while 1Password employs even more rounds of hashing. This is designed to slow down brute-force attacks, and it almost works. Granted, these are still nearly an order of magnitude less secure than, say, Microsoft Office 2016 documents, but even this level of security is much better than nothing." I'm guessing they meant more secure then Office 2016.
No, per the included graph, brute forcing Office 2016 allowed them fewer guesses per second. Whatever its hashing algorithm, it's stronger than that being used by the password managers.