1298
submitted 8 months ago by woshang@lemmy.world to c/memes@lemmy.ml
top 50 comments
sorted by: hot top controversial new old
[-] Holzkohlen@feddit.de 107 points 8 months ago

The only good passwords are those you don't know yourself because they are randomly generated and all stored in your password manager of choice.

[-] PieMePlenty@lemmy.world 60 points 8 months ago

Until some locked down tv/console type device asks me for a password.

[-] zalgotext@sh.itjust.works 59 points 8 months ago

Then you look up the random string of 36 characters once, think "why did I make this one 36 characters" as you painstakingly type it in with a TV remote, then immediately forget it as soon as you're logged in.

[-] Lt_Cdr_Data@discuss.tchncs.de 20 points 8 months ago

Then repeat this process every few months the device decides it needs to ask the password of you again. Not playing this game

[-] Johanno@feddit.de 9 points 8 months ago

Take the TV throw it out of the window.

Buy a minipc and plugin a cheap Monitor via hdmi.

Setup kodi or similar on your minipc and you won't even have ads anymore because you will of course install pihole too.

load more comments (1 replies)
load more comments (1 replies)
load more comments (9 replies)
[-] vsis@feddit.cl 11 points 8 months ago

I use an off-line libre password manager for several bad designed goverment stuff that only accept numbers as passwords or don't allow to paste it.

It's not that hard and I easily get used to it. I read it, type it and forget it again.

load more comments (6 replies)
load more comments (2 replies)
[-] stebo02@lemmy.dbzer0.com 37 points 8 months ago

it's all fun and games until you don't have access to your password manager

load more comments (1 replies)
[-] tilcica@lemm.ee 15 points 8 months ago

depends on the password manager....

also, the length of the password is WAY more important than it being randomly generated as long as it's not in a password dictionary somewhere. I use 20+ character passphrases that i can easily remember everywhere for instance

[-] MrVilliam@lemmy.world 9 points 8 months ago

My strategy is to have a persistent short passphrase that's within every password I use, and pair it with a silly bastardization of the service I have an account for. So, for example, if my passphrase were hunter2 (lol) and I had an account on Netflix, my password for Netflix might be something like hunter2NutFlex. Because of this, I can manage my own passwords in basic text as "code NutFlex" because the "code" portion is encrypted in my own fucking brain. If Netflix gets hacked, somebody has a password that only works with Netflix, and they'd need my text file as a Rosetta Stone to acquire my other passwords. Not impossible, but who the fuck am I and why would anybody dig that deep to do that to me?

I'm no IT expert, so somebody tell me if this is a stupid and overly vulnerable strategy. I thought I was pretty brilliant for coming up with this and rolling it out several years ago.

[-] tilcica@lemm.ee 7 points 8 months ago

i am an IT person (wouldnt say expert) and i do this. password cracking time is based on the number of characters, not the type of char so you can do "abcdefghijk" and it will be more secure than "_a;" (both are still weak but my point stands)

all of this can be broken if you just use common passwords or plain english words since those are broken with dictionary attacks

load more comments (4 replies)
load more comments (2 replies)
[-] kamen@lemmy.world 37 points 8 months ago

Imagine a site telling you "Sorry, you can't use asdf123 as your password: you've already used it on that other site".

load more comments (6 replies)
[-] Kedly@lemm.ee 36 points 8 months ago* (last edited 8 months ago)

Counterpoint: Password Manager = One point of failure

Multiple Strong Passwords that have to be changed every 3 months even to sign on to your cornerstore rewards program without a password manager? Guess you're never accessing any account older than 3 months because you've forgotten th3 b1lli0n$ oF s+r0ng p4s5w0rds Y0u h4Ve cr3atEd!

[-] Catsrules@lemmy.ml 25 points 8 months ago

Actually you are the single point of failure

https://xkcd.com/538/

[-] Kedly@lemm.ee 7 points 8 months ago

I mean yeah, the security benefit from being un-notable isnt negligible

[-] FakinUpCountryDegen@lemmy.world 14 points 8 months ago

That's...not a counterpoint.

You can have strong authentication on your central password manager, and have an encrypted container protecting it.

There is no logical argument against password vaults as a concept. There are bad implementations of specific password vaults, but a password vault is the answer for the highest possible password based security available in 2023.

load more comments (3 replies)
[-] 0xD@infosec.pub 9 points 8 months ago* (last edited 8 months ago)

Okay and now let's get into threat modelling and risk management.

What is the purpose of a password manager? What are the possible threats against them, and what are those against singular passwords for services? What is the risk of each of those?

load more comments (5 replies)
[-] The_Eminent_Bon@lemmy.world 29 points 8 months ago

So your password is cardboard fort?

[-] GissaMittJobb@lemmy.ml 21 points 8 months ago

Just use a password manager, then you get the benefits of having a single password to remember without the security-related downsides.

[-] Rubanski@lemm.ee 19 points 8 months ago

I never got over the fact that I somehow need to trust to an absurdly high degree a proprietary software to store ALL my passwords. Is this really a good idea?

[-] Aicse@lemmy.world 24 points 8 months ago

You can use KeePass, but you'll have to figure out a way to have your password vault available on other devices (can do it by using any cloud shares, i.e. GDrive). This way you'll be in charge of almost every aspect of your passwords. But you'll have to take care of backups and keep everything in sync.

[-] Viking_Hippie@lemmy.world 13 points 8 months ago

KeePass

I'm sorry but no. I'm physically incapable of not moving the capital letter one space and I'm not entrusting my passwords to what I've irrationally decided IS named KeepAss. I just can't.

[-] Amaltheamannen@lemmy.ml 13 points 8 months ago

I like Vaultwarden. Open source rust server compatible with bitwarden.

[-] kjo@discuss.tchncs.de 10 points 8 months ago

And then there's KeePassXC.

Get it? Keep-Ass-Sexy :)

https://en.wikipedia.org/wiki/KeePassXC

load more comments (2 replies)
[-] Fissionami@lemmy.ml 9 points 8 months ago

Or simply can use, Bitwarden or Protonpass

load more comments (1 replies)
load more comments (3 replies)
[-] vsis@feddit.cl 11 points 8 months ago

There are libre off-line password managers. Variants of Keepass for example.

Indeed it's a bad idea to store passwords in a propietary system. Specially a cloud based one being hacked time to time, like 1password.

load more comments (7 replies)
load more comments (2 replies)
[-] Mr_Dr_Oink@lemmy.world 9 points 8 months ago

So all my passwords are locked behind a single password? Isnt this essentially the same as using the same password for every site. In that they only need to cracl o e password to have access to everything?

[-] parpol@programming.dev 20 points 8 months ago

The danger of using the same password everywhere is from leaks caused by poor security in one of those sites.

Passwords getting leaked are almost always unrelated to how strong the passwords are and has more to do with how those password are stored, and what protection measures they have against unauthorized people accessing them.

No one is ever going to "crack" your single password for your password manager as long as it is a strong password, though you might write it down in your wallet and lose it in a busy station, just like some administrator of a website might forget to close outside access to their mysql database containing unencrypted plaintext passwords.

load more comments (7 replies)
load more comments (2 replies)
[-] Paradachshund 18 points 8 months ago

Everyone talks about password managers these days, but isn't that telling the hackers exactly where to go to get all your passwords? Seems like a much higher chance of catastrophic failure to me if you have a single point of entry.

[-] moonmeow@lemmy.ml 18 points 8 months ago

Yes that's definitely a concern to keep in mind.

The problem is that if someone doesn't use a password manager they're morenlikely to reuse weak ones.

Using a password manager is a better path, as long as there is awareness on how to keep it secured.

load more comments (6 replies)
[-] Hexarei@programming.dev 11 points 8 months ago

Only if you're using a third-party password manager, rather than something stored/managed locally.

load more comments (14 replies)
[-] Fiivemacs@lemmy.ca 9 points 8 months ago

I just use a password manager for my password managers password manager. 2fa on all of em. Takes me forever to login

[-] Paradachshund 8 points 8 months ago

I dunno, doesn't sound like enough layers to me. We can go deeper

load more comments (3 replies)
load more comments (5 replies)
[-] youngGoku@lemmy.world 17 points 8 months ago

It was literally a battle for me to have a strong unique password for our baby monitor... Wife was not happy about that but I came out on top.

[-] Agent641@lemmy.world 12 points 8 months ago* (last edited 8 months ago)

I've actually come up with a way to have a complex and unique password for each service which is also resilient againt forced password changes, doenst require a password manager, and if Im being tortured I still wont be able to tell them what it is because I dont know it unless Im at the login screen. If the service changes the layout of their login screen though, Im fucked.

[-] mac12m99@feddit.it 8 points 8 months ago
[-] BigBlackCockroach@lemmy.world 9 points 8 months ago

It must be some sort of compression algorithm of the information presented at the log-in screen.

[-] ours@lemmy.world 16 points 8 months ago

If they change/rebrand the login he's screwed. Just use a password manager people.

load more comments (8 replies)
[-] clanginator@lemmy.world 10 points 8 months ago* (last edited 8 months ago)

I came up with a formula for my passwords - as easy to remember as a single password and makes a unique login for every site feasible without a password manager. Can be updated as often as you like and all you gotta do is remember the latest version of the formula. At the very least, the hashes will be different and it'd take someone having more than two of my passwords to figure out the pattern.

I also use over 100 email aliases with my own domain name so that my most important accounts have a separate login that isn't a common domain that wouldn't be easy for someone to guess.

It would take a lot of concentrated effort for someone to get at any of my important accounts, and even my less important ones would be pretty difficult to get into even if multiple accounts are compromised, due to using a smaller pool of aliases under common domains for less important accounts.

Someone got into half a dozen of my accounts a few years ago and I finally started taking security seriously.

[-] cheezoid2@sh.itjust.works 9 points 8 months ago

At this time of day, in this part of the country, localized entirely in your accounts?

[-] newIdentity@sh.itjust.works 8 points 8 months ago

Not really though. Once the password has been leaked, it needs to be cracked. And that usually doesn't happen when the password is strong enough.

Except the password wasn't hashed but then the company belongs to get sued to bankruptcy

[-] randombullet@feddit.de 16 points 8 months ago

That's also assuming they used proper salts and a strong hashing algorithm.

Also MITM and or phishing attacks are not super common but can also depreciate your common password very quickly.

Always layered defense. If it's not 1 thing, it could be another.

Unique passwords are just one facet on a multi-layered security defense.

load more comments (4 replies)
[-] Aurix@lemmy.world 8 points 8 months ago

Since you can never now for sure how a company handles hashing, always assume the worst. You will fare better.

load more comments (3 replies)
load more comments
view more: next ›
this post was submitted on 27 Oct 2023
1298 points (98.0% liked)

Memes

44073 readers
2235 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS