可以看出來又增加不少壓縮率，這算是針對資料庫壓縮從 A 到 A+ 的行為吧...
When processing requests to establish and change memorized secrets, verifiers SHOULD compare the prospective secrets against a dictionary of known commonly-used and/or compromised values. This list SHOULD include passwords from previous breach corpuses, as well as dictionary words and specific words (such as the name of the service itself) that users are likely to choose. If the chosen secret is found in the dictionary, the subscriber SHOULD be required to choose a different value. The subscriber SHOULD be advised that they need to select a different secret because their previous choice was commonly used.
除了一般的字典檔以外，還要從之前被破的網站取得。這部份的資料可以從 danielmiessler/SecLists 這邊的