this post was submitted on 05 Jul 2023
1211 points (99.8% liked)

Android

28009 readers
163 users here now

DROID DOES

Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules


1. All posts must be relevant to Android devices/operating system.


2. Posts cannot be illegal or NSFW material.


3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.


4. Non-whitelisted bots will be banned.


5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.


6. Memes are not allowed to be posts, but are allowed in the comments.


7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.


8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.


Community Resources:


We are Android girls*,

In our Lemmy.world.

The back is plastic,

It's fantastic.

*Well, not just girls: people of all gender identities are welcomed here.


Our Partner Communities:

!android@lemmy.ml


founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] jesterraiin@lemmy.world 1 points 1 year ago

If I were to list devices under my control both at home and at work, it'd come as massive flex, since I work as corporate sysadmin and that's only my most recent job. So, rather than that, let me just say that if you happen to find such small environment difficult to control, password-wise, you're approaching the problem wrong.

Invest in very simple mnemonic solutions (which is just a fancy name for reducing seemingly complex memory tasks to trivialities), learn about patterns and password's entropy, and do remember, that:

  • Currently (non quantum-computing freely available), @2@JustARegularNerd@2@ is as good password as NDuknn#$83!$%, since they both will take ridiculous amount of time to break raw and an attempt to break it will activate safety procedures in every reasonable online service there is. The former is a trivial thing to remember, since it uses your nickname and @2@ string. Here, you can test both for predicted time to break.
  • Relying on third party software solutions, especially closed-software for security is always risky, no matter what the developer(s) behind it claims, and no matter how professional it looks like. There are leaks and account takeovers all the time, businesses are being sold, or turn out to be run by crooked characters, governments force the "bastions of freedom" to kneel, and they do kneel.