this post was submitted on 27 Nov 2023
159 points (89.9% liked)

Asklemmy

43950 readers
821 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy πŸ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] shinigamiookamiryuu@lemm.ee 11 points 1 year ago (2 children)

Passwords. We assume a hard to guess and everchanging password will be hard to crack, but the whole point of machines is that it can be pinpointed with utmost accuracy, and everytime someone tells you to use special phrases in passwords, they're also inadvertently saying "hey thieves, here is what to look out for, happy guessing". They're supposed to be more like speakeasies.

I remember long ago, when I was active as Dabran2 on Neopets, there was a vault with nine dropdown menus that you had to guess the combination to on the moon Kreludor. It was simpler and far more effective. To this day, I couldn't tell you what's on the other side (or I'd have to annihilate you and feed your remains to the turmaculus, assuming you believe I made it to the other side).

[–] vzq@lemmy.blahaj.zone 13 points 1 year ago (1 children)

Passwords, as in user chosen secrets used to prove identity, are a really bad idea in general. Turns out, people are crappy at coming up with stuff that is hard to guess. They are also crappy at remembering things that are hard to guess. That’s why every website these days wants to SMS you a code or makes you use an Authenticator.

Thankfully people are catching on, and secure passwordless sign in is gaining ground rapidly.

[–] shinigamiookamiryuu@lemm.ee -2 points 1 year ago (3 children)

I'm surprised no place uses IP addresses anymore to authenticate (I was around when Postopia did or whatever that candy themed game place was). Many IP-ban when it comes to identifying rulebreakers, you'd think they'd IP-authenticate too.

[–] ahal@lemmy.ca 8 points 1 year ago (1 children)

Imagine if your roommate could just get into all your accounts?

I know that's untactical, but I mean as long as IP bans are already a thing...

[–] vzq@lemmy.blahaj.zone 4 points 1 year ago

All major services do risk based authentication these days. I’m fairly certain network address factors into the risk calculations.

[–] mackwinston@feddit.uk 4 points 1 year ago

Carrier grade NAT. For instance, on our local mobile phone network, thousands of handsets will have the same public IP address.

[–] Extrasvhx9he 11 points 1 year ago* (last edited 1 year ago) (2 children)

Yeah knew a guy that used to work at a place where they had him change his password every 2 months or so kinda stupid. Entropy is really all you need to check. Also by special phrases do you mean ~~salting~~ peppering your passwords?

[–] shinigamiookamiryuu@lemm.ee 4 points 1 year ago (1 children)
[–] Extrasvhx9he 8 points 1 year ago (1 children)

The peppering passwords? That's where you add a special word or phrase in all of your passwords but not in your password manager. It's usually done in case your password manager becomes compromised thats why I got a bit confused with your statement, haha

Yes, or a general way of putting it anyways.

[–] boatswain@infosec.pub 3 points 1 year ago (1 children)

Salting and peppering isn't something you do; it's something the site does prior to hashing your password and storing the hash.

[–] Extrasvhx9he 2 points 1 year ago* (last edited 1 year ago)

Yes you're correct but what I was referring to was using an extra string of characters to protect against a compromised password manager

Edit: Here's a link to bitwarden's website that further clarifies what I meant