485
top 50 comments
sorted by: hot top controversial new old
[-] Lumidaub@feddit.de 71 points 11 months ago
[-] user224@lemmy.sdf.org 13 points 11 months ago* (last edited 11 months ago)

Nooo! The fireeee! This would be better with a physical keyboard.
Link for compatibility

My final password was: Pass5@JulyXXXV+Shell+n2by7+droop+🌚+Peru+2020+Qd7+🥚+Zn+BBBBB

The hardest 2 were chess and guessing the country. Maybe atomic numbers with combination with roman numerals, but that's sorta fine.

load more comments (1 replies)
[-] kartonrealista@lemmy.world 12 points 11 months ago
[-] Lumidaub@feddit.de 11 points 11 months ago* (last edited 11 months ago)

Well, that'll teach you to actually take care of your pets and not just dump their food in front of them and be done with it.

(fuck paul tho fr)

[-] otter@lemmy.ca 8 points 11 months ago* (last edited 11 months ago)

Ah I was just copying the URL to post the same thing. It's such a fun game to go through, although I gave up pretty quickly

Tried it again, made it to the chess step

[-] Trainguyrom@reddthat.com 8 points 11 months ago

One of my coworkers got super into it and got into the high 20s I made an off-hand comment about wondering what it does for rule 34 and he responded "gasp I must know!" Then a couple days later messages me a screenshot on teams. Spoiler: it goes "ehhh let's just skip this rule"

[-] Thekingoflorda@lemmy.world 7 points 11 months ago

Use lichess.org’s board editor

[-] user224@lemmy.sdf.org 4 points 11 months ago

You're telling me I didn't need to use my brain?

[-] Thekingoflorda@lemmy.world 5 points 11 months ago

You're on programmer humor, we don't do "Brain" here.

[-] Holyhandgrenade@lemmy.world 4 points 11 months ago

This game made me so angry haha

load more comments (2 replies)
[-] Sonotsugipaa@lemmy.dbzer0.com 39 points 11 months ago

Infuriating fact: if a service has maximum password length limits (lower than 1000 characters), they're reversibly storing your password and if they're that lazy it's probably plain text

[-] Xandris@kbin.social 8 points 11 months ago
[-] Downcount@lemmy.world 14 points 11 months ago

Yeah, you actually better not save the users passwords in plain text or in an encrypted way it could be decrypted. You rather save a (salted) hashed string of the password. When a user logs in you compare the hashed value of the password the user typed in against the hashed value in your database.

What is hashed? Think of it like a crossfoot of a number:

Let's say you have a number 69: It's crossfoot is (6+9) 15. But if someone steals this crossfoot they can't know the original number it's coming from. It could be 78 or 87.

[-] twolate@discuss.tchncs.de 8 points 11 months ago

Dumb question: isn't it irrelevant for the malicous party if it's 78 or 87 per your example, because the login only checks the hash anyway? Won't both numbers succesfully login?

[-] foudinfo@jlai.lu 22 points 11 months ago

It's actually a really good question. What you're explaining is called a collision, by creating the same hash with different numbers you can succesfully login.

This why some standard hashing function become deprecated and are replaced when someone finds a collision. MD5, which was used a lot to hash passwords or files, is considered insecure because of all the collisions people could find.

[-] conciselyverbose@kbin.social 9 points 11 months ago

In the example yes.

In the real world, finding an input that produces the right hash output isn't easy. And because a lot of users reuse passwords (don't do it, but people do), a list of emails and passwords gives you an incredibly lazy and easy to do way to compromise accounts on other sites.

[-] Trainguyrom@reddthat.com 8 points 11 months ago

Reminds me of a funny moment in my IT internship, ahead of an audit one of the sysadmins came over and was saying "yeah so I pulled all of the department password hashes to check for weak/compromised accounts and noticed one person has the same sysadmin and user password hash" and my boss went "wait everyone doesn't do that?" And after realizing they outed themselves turned bright red and changed their admin password

[-] kartonrealista@lemmy.world 6 points 11 months ago

With a hash it's difficult to find a combination that results in this specific hashed password. Think of it like this: you have a biiig prime number and you multiply it by another. Now, that's easy, but it's way harder to do it backwards - factorize a large composite number (this is just for illustration). Similarly trying to find a password that works when you input it based on the hashed one is way more difficult than hashing the password in the first place.

[-] Downcount@lemmy.world 5 points 11 months ago* (last edited 11 months ago)

Additional to what others have said: The "salted" part is very relevant for storing.

There aren't soooo many different hashing algorithms people use. So, let's simplify the hashing again with the crossfoot example.

Let's say, 60% of websites use this one algorithm (crossfoot) for storing your password, and someone steals the password "hashes" (and the login / email). I could ran a program that creates me a list of all possible crossfoots for all numbers for 1 to 100000.

This would give me an easy lookup table for finding the "real" number behind those hashes. (Those tables exists. Look up "rainbow tables")

Buuuut what if I use a little bit of salt (and pepper pepper pepper) before doing my hashing / crossfooting?

Let's use the pw "69" again and use a salt with a random number "420" and add them all together:

6 + 9 + 420 = 435

This hash wouldn't be in my previous mentioned lookup table. Use different salts for every user and at least the lookup problem isn't such a big problem anymore.

[-] Woe2TheRepublic@lemmy.world 4 points 11 months ago

This was super helpful 🙏🏼 sent me down a whole other rabbit hole of learning

load more comments (1 replies)
[-] Gurfaild@feddit.de 8 points 11 months ago

In the least bad case, they encrypt the password instead of hashing it, making it possible to decrypt the password.

In the most common case, they store the password in plaintext, so there isn't even any encryption to be reversed.

[-] newsonic@lemmy.world 6 points 11 months ago

Nope. No point in storing > 256 or even 128 chars for a password anyway. Useless storage wasted. Also it doesn’t really mean they store the password badly in the server.

[-] peter@feddit.uk 18 points 11 months ago

A hashed password is always the same length though is it not?

load more comments (2 replies)
[-] conciselyverbose@kbin.social 8 points 11 months ago

Ignoring that they must be hashed to be acceptable and that it's not possible for 1000 characters of text to add up to a waste of storage worth mentioning in pretty much any environment, it's literally impossible for a 128 character password limit to be beneficial in any way.

A limit below that demonstrably lowers security by a huge margin.

load more comments (4 replies)
load more comments (6 replies)
[-] rog@lemmy.one 35 points 11 months ago* (last edited 11 months ago)

Best practice in 2023 is a simple, sufficiently long but memorable passphrase. Excessive requirements mean users just create weak passwords with patterns.
[Capital letter]basic word(number){special character}

Enforcing password changes doesnt help either. It just creates further patterns. The vast majority of compromised credentials are used immediately or within a short time frame anyway. Changing the password 2 months later isnt going to help and passwords like July2023!, which are common, are weak to begin with.

A non expiring, long, easily remembered passphase like
forgetting-spaghetti-toad-box
Is much more secure than a short password with enforced complexity requirements.

[-] kevincox@lemmy.ml 37 points 11 months ago

Drop "memorable". 99.9% of your passwords should be managed by your password manager and don't need to be memorized. On one or two passwords that you actually need to type (like your computer login) need to be memorable.

[-] user224@lemmy.sdf.org 8 points 11 months ago

I am kinda paranoid about password managers. My passwords are stored somewhere on the computer, all of them, and I don't like that idea. I can exercise my brain.

[-] gamma@programming.dev 18 points 11 months ago

I have 350 items in my BW vault. I am not memorizing that many passwords, I'd rather use my brain for something else.

[-] kevincox@lemmy.ml 14 points 11 months ago

I encourage you to think critically about this and re-evaluate your decision. I would say that for at least 99.99% of people a password manager is significantly more secure overall.

  • Browser-integrated password managers will avoid filling your password into the wrong site. This is a great barrier to phishing.
  • Allows a unique password per-site which greatly mitigates the problem of password leaks which are fairly common.
  • Allows you to use much stronger passwords than you can memorize.
  • It's quite convenient to just click "login".

For most people phishing is a far bigger risk than some malware stealing their local password databases. To make database theft even less of a concern most password managers have the option to encrypt the local database file. This means that to steal your passwords the malware will need to extract the encryption key from the password manager process which can often be configured to forget the key quickly after the last use.

Also consider that if you have malware that can steal your password database and the encryption key it can probably just keylog all your passwords or steal your browser's cookie jar. So the extra barrier here is minimal.

I think you are right to be suspicious of having a vault of passwords "ready to steal" but in practice the upsides far outweigh the downsides, especially if you make a security-focused choice of password manager.

[-] Scraft161@iusearchlinux.fyi 10 points 11 months ago

I've been using keepassxc for a while now and it's better than most other options, everything is stored locally and encrypted behind a master password.

All you micht want to do is make a backup of your vault onto an external drive (best practice would be encrypted via the options you have, I use luks because I'm a Linux nerd).

load more comments (1 replies)
load more comments (2 replies)
[-] demonsword@lemmy.world 5 points 11 months ago

99.9% of your passwords should be managed by your password manager

this looks like a sensible approach until you remember password managers can be cracked, too. I'm with GP on this, a passphrase is easier to remember and is good enough for most use cases, if you need more security you should be using some form or another of 2FA anyway

load more comments (4 replies)
[-] bappity@lemmy.world 22 points 11 months ago

I don't get why some sites limit your usage of special characters and have miniscule max lengths?? looking at you PayPal you piece of shit

[-] nekat_emanresu@lemmy.ml 5 points 11 months ago

"This password would take 1 century to crack!"

[-] csm10495@sh.itjust.works 19 points 11 months ago

There was a website where I was making an account and it was like: no semicolons.

To this day I wonder if that was how they blocked sql injection.

[-] HurlingDurling@lemm.ee 8 points 11 months ago

Then, please give us your phone number for 2fa, instead of letting you use a more secure app

[-] jg1i@lemmy.world 7 points 11 months ago

The right answer is use a password manager to generate and store a long password. Then it doesn't matter.

[-] TheBeege@lemmy.world 6 points 11 months ago

If for some reason you want a secure password and aren't using a password manager https://www.grc.com/passwords.htm

[-] Crazyslinkz@lemmy.world 4 points 11 months ago

Does anyone use the generator from chrome anymore? Like a 2023 password for me is "suggest strong password"...

[-] Bandicoot_Academic@lemmy.one 4 points 11 months ago
load more comments (1 replies)
load more comments
view more: next ›
this post was submitted on 17 Jul 2023
485 points (99.8% liked)

Programmer Humor

31229 readers
1418 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 4 years ago
MODERATORS