this post was submitted on 17 May 2025
775 points (96.0% liked)

Mildly Infuriating

39633 readers
366 users here now

Home to all things "Mildly Infuriating" Not infuriating, not enraging. Mildly Infuriating. All posts should reflect that.

I want my day mildly ruined, not completely ruined. Please remember to refrain from reposting old content. If you post a post from reddit it is good practice to include a link and credit the OP. I'm not about stealing content!

It's just good to get something in this website for casual viewing whilst refreshing original content is added overtime.


Rules:

1. Be Respectful


Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

...


2. No Illegal Content


Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means: -No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

...


3. No Spam


Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

...


4. No Porn/ExplicitContent


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

...


5. No Enciting Harassment,Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

...


6. NSFW should be behind NSFW tags.


-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

...


7. Content should match the theme of this community.


-Content should be Mildly infuriating.

-The Community !actuallyinfuriating has been born so that's where you should post the big stuff.

...


8. Reposting of Reddit content is permitted, try to credit the OC.


-Please consider crediting the OC when reposting content. A name of the user or a link to the original post is sufficient.

...

...


Also check out:

Partnered Communities:

1.Lemmy Review

2.Lemmy Be Wholesome

3.Lemmy Shitpost

4.No Stupid Questions

5.You Should Know

6.Credible Defense


Reach out to LillianVS for inclusion on the sidebar.

All communities included on the sidebar are to be made in compliance with the instance rules.

founded 2 years ago
MODERATORS
 

In password security, the longer the better. With a password manager, using more than 24 characters is simple. Unless, of course, the secure password is not accepted due to its length. (In this case, through STOVE.)

Possibly indicating cleartext storage of a limited field (which is an absolute no-go), or suboptimal or lacking security practices.

you are viewing a single comment's thread
view the rest of the comments
[–] BradleyUffner@lemmy.world 10 points 1 day ago (2 children)

I really hope you don't work in the tech industry.

[–] possiblylinux127@lemmy.zip 0 points 1 day ago (1 children)

I've yet to see anyone link to a source

Here is where I'm getting my info

https://cybersecuritynews.com/nist-rules-password-security/

[–] SkaveRat@discuss.tchncs.de 4 points 1 day ago

you realize that they say the exact opposite of what you are saying, right?

Longer passwords are generally more secure and easier for users to remember,” said Dr. Paul Turner, a cybersecurity expert at NIST. “We’re moving away from complex rules that often lead to predictable patterns and towards encouraging unique, lengthy passphrases.

[–] possiblylinux127@lemmy.zip -5 points 1 day ago (2 children)

You haven't provided any evidence to support your claim. Online accounts can't easily be brute forced.

If a hash is leaked you just change the password. As long as you aren't reusing the same password everywhere you are fine.

[–] Kissaki@feddit.org 2 points 1 day ago (1 children)

How do you know when a password is leaked?

What's the distribution of variance in brute force protections on online services?

[–] possiblylinux127@lemmy.zip 1 points 1 day ago

Why would it matter? If they can access the password they probably can access everything else on that service. Just don't reuse passwords.

[–] humorlessrepost@lemmy.world 4 points 1 day ago

If the hashes are leaked and that’s immediately caught and customers are immediately informed, just change your password.