this post was submitted on 27 Oct 2023
1302 points (98.0% liked)

Memes

45719 readers
917 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] Holzkohlen@feddit.de 107 points 1 year ago (5 children)

The only good passwords are those you don't know yourself because they are randomly generated and all stored in your password manager of choice.

[–] PieMePlenty@lemmy.world 60 points 1 year ago (4 children)

Until some locked down tv/console type device asks me for a password.

[–] zalgotext@sh.itjust.works 59 points 1 year ago (9 children)

Then you look up the random string of 36 characters once, think "why did I make this one 36 characters" as you painstakingly type it in with a TV remote, then immediately forget it as soon as you're logged in.

[–] Lt_Cdr_Data@discuss.tchncs.de 20 points 1 year ago (2 children)

Then repeat this process every few months the device decides it needs to ask the password of you again. Not playing this game

[–] Johanno@feddit.de 9 points 1 year ago (1 children)

Take the TV throw it out of the window.

Buy a minipc and plugin a cheap Monitor via hdmi.

Setup kodi or similar on your minipc and you won't even have ads anymore because you will of course install pihole too.

load more comments (1 replies)
load more comments (1 replies)
[–] Viking_Hippie@lemmy.world 7 points 1 year ago (1 children)

Ugh, I hate typing with the remote so fucking much! It's worse than having a mild case of covid-19.

load more comments (1 replies)
load more comments (7 replies)
[–] vsis@feddit.cl 11 points 1 year ago (6 children)

I use an off-line libre password manager for several bad designed goverment stuff that only accept numbers as passwords or don't allow to paste it.

It's not that hard and I easily get used to it. I read it, type it and forget it again.

load more comments (6 replies)
load more comments (2 replies)
[–] stebo02@lemmy.dbzer0.com 37 points 1 year ago (1 children)

it's all fun and games until you don't have access to your password manager

load more comments (1 replies)
[–] tilcica@lemm.ee 15 points 1 year ago (1 children)

depends on the password manager....

also, the length of the password is WAY more important than it being randomly generated as long as it's not in a password dictionary somewhere. I use 20+ character passphrases that i can easily remember everywhere for instance

[–] MrVilliam@lemmy.world 9 points 1 year ago (5 children)

My strategy is to have a persistent short passphrase that's within every password I use, and pair it with a silly bastardization of the service I have an account for. So, for example, if my passphrase were hunter2 (lol) and I had an account on Netflix, my password for Netflix might be something like hunter2NutFlex. Because of this, I can manage my own passwords in basic text as "code NutFlex" because the "code" portion is encrypted in my own fucking brain. If Netflix gets hacked, somebody has a password that only works with Netflix, and they'd need my text file as a Rosetta Stone to acquire my other passwords. Not impossible, but who the fuck am I and why would anybody dig that deep to do that to me?

I'm no IT expert, so somebody tell me if this is a stupid and overly vulnerable strategy. I thought I was pretty brilliant for coming up with this and rolling it out several years ago.

[–] tilcica@lemm.ee 7 points 1 year ago

i am an IT person (wouldnt say expert) and i do this. password cracking time is based on the number of characters, not the type of char so you can do "abcdefghijk" and it will be more secure than "_a;" (both are still weak but my point stands)

all of this can be broken if you just use common passwords or plain english words since those are broken with dictionary attacks

load more comments (4 replies)
load more comments (2 replies)
[–] kamen@lemmy.world 37 points 1 year ago (6 children)

Imagine a site telling you "Sorry, you can't use asdf123 as your password: you've already used it on that other site".

load more comments (6 replies)
[–] Kedly@lemm.ee 36 points 1 year ago* (last edited 1 year ago) (3 children)

Counterpoint: Password Manager = One point of failure

Multiple Strong Passwords that have to be changed every 3 months even to sign on to your cornerstore rewards program without a password manager? Guess you're never accessing any account older than 3 months because you've forgotten th3 b1lli0n$ oF s+r0ng p4s5w0rds Y0u h4Ve cr3atEd!

[–] Catsrules@lemmy.ml 25 points 1 year ago (1 children)

Actually you are the single point of failure

https://xkcd.com/538/

load more comments (1 replies)
[–] FakinUpCountryDegen@lemmy.world 14 points 1 year ago (3 children)

That's...not a counterpoint.

You can have strong authentication on your central password manager, and have an encrypted container protecting it.

There is no logical argument against password vaults as a concept. There are bad implementations of specific password vaults, but a password vault is the answer for the highest possible password based security available in 2023.

load more comments (3 replies)
[–] 0xD@infosec.pub 9 points 1 year ago* (last edited 1 year ago) (5 children)

Okay and now let's get into threat modelling and risk management.

What is the purpose of a password manager? What are the possible threats against them, and what are those against singular passwords for services? What is the risk of each of those?

load more comments (5 replies)
[–] The_Eminent_Bon@lemmy.world 29 points 1 year ago (1 children)

So your password is cardboard fort?

[–] KnowledgeableNip@leminal.space 37 points 1 year ago (3 children)
[–] remotedev@lemmy.ca 21 points 1 year ago (3 children)
load more comments (3 replies)
load more comments (2 replies)
[–] GissaMittJobb@lemmy.ml 21 points 1 year ago (4 children)

Just use a password manager, then you get the benefits of having a single password to remember without the security-related downsides.

[–] Rubanski@lemm.ee 19 points 1 year ago (4 children)

I never got over the fact that I somehow need to trust to an absurdly high degree a proprietary software to store ALL my passwords. Is this really a good idea?

[–] Aicse@lemmy.world 24 points 1 year ago (5 children)

You can use KeePass, but you'll have to figure out a way to have your password vault available on other devices (can do it by using any cloud shares, i.e. GDrive). This way you'll be in charge of almost every aspect of your passwords. But you'll have to take care of backups and keep everything in sync.

[–] Viking_Hippie@lemmy.world 13 points 1 year ago (4 children)

KeePass

I'm sorry but no. I'm physically incapable of not moving the capital letter one space and I'm not entrusting my passwords to what I've irrationally decided IS named KeepAss. I just can't.

[–] Amaltheamannen@lemmy.ml 13 points 1 year ago

I like Vaultwarden. Open source rust server compatible with bitwarden.

[–] kjo@discuss.tchncs.de 10 points 1 year ago

And then there's KeePassXC.

Get it? Keep-Ass-Sexy :)

https://en.wikipedia.org/wiki/KeePassXC

load more comments (2 replies)
[–] Fissionami@lemmy.ml 9 points 1 year ago (1 children)

Or simply can use, Bitwarden or Protonpass

load more comments (1 replies)
load more comments (3 replies)
[–] vsis@feddit.cl 11 points 1 year ago (8 children)

There are libre off-line password managers. Variants of Keepass for example.

Indeed it's a bad idea to store passwords in a propietary system. Specially a cloud based one being hacked time to time, like 1password.

load more comments (8 replies)
load more comments (2 replies)
[–] Mr_Dr_Oink@lemmy.world 9 points 1 year ago (8 children)

So all my passwords are locked behind a single password? Isnt this essentially the same as using the same password for every site. In that they only need to cracl o e password to have access to everything?

load more comments (7 replies)
load more comments (2 replies)
[–] youngGoku@lemmy.world 17 points 1 year ago

It was literally a battle for me to have a strong unique password for our baby monitor... Wife was not happy about that but I came out on top.

[–] Paradachshund@lemmy.today 17 points 1 year ago (8 children)

Everyone talks about password managers these days, but isn't that telling the hackers exactly where to go to get all your passwords? Seems like a much higher chance of catastrophic failure to me if you have a single point of entry.

[–] moonmeow@lemmy.ml 18 points 1 year ago (6 children)

Yes that's definitely a concern to keep in mind.

The problem is that if someone doesn't use a password manager they're morenlikely to reuse weak ones.

Using a password manager is a better path, as long as there is awareness on how to keep it secured.

load more comments (6 replies)
[–] Hexarei@programming.dev 11 points 1 year ago (14 children)

Only if you're using a third-party password manager, rather than something stored/managed locally.

load more comments (14 replies)
[–] Fiivemacs@lemmy.ca 9 points 1 year ago (1 children)

I just use a password manager for my password managers password manager. 2fa on all of em. Takes me forever to login

[–] Paradachshund@lemmy.today 8 points 1 year ago (3 children)

I dunno, doesn't sound like enough layers to me. We can go deeper

load more comments (3 replies)
load more comments (5 replies)
[–] Agent641@lemmy.world 12 points 1 year ago* (last edited 1 year ago) (1 children)

I've actually come up with a way to have a complex and unique password for each service which is also resilient againt forced password changes, doenst require a password manager, and if Im being tortured I still wont be able to tell them what it is because I dont know it unless Im at the login screen. If the service changes the layout of their login screen though, Im fucked.

[–] mac12m99@feddit.it 8 points 1 year ago (1 children)
[–] BigBlackCockroach@lemmy.world 9 points 1 year ago (1 children)

It must be some sort of compression algorithm of the information presented at the log-in screen.

[–] ours@lemmy.world 16 points 1 year ago (8 children)

If they change/rebrand the login he's screwed. Just use a password manager people.

load more comments (8 replies)
[–] clanginator@lemmy.world 10 points 1 year ago* (last edited 1 year ago)

I came up with a formula for my passwords - as easy to remember as a single password and makes a unique login for every site feasible without a password manager. Can be updated as often as you like and all you gotta do is remember the latest version of the formula. At the very least, the hashes will be different and it'd take someone having more than two of my passwords to figure out the pattern.

I also use over 100 email aliases with my own domain name so that my most important accounts have a separate login that isn't a common domain that wouldn't be easy for someone to guess.

It would take a lot of concentrated effort for someone to get at any of my important accounts, and even my less important ones would be pretty difficult to get into even if multiple accounts are compromised, due to using a smaller pool of aliases under common domains for less important accounts.

Someone got into half a dozen of my accounts a few years ago and I finally started taking security seriously.

[–] cheezoid2@sh.itjust.works 9 points 1 year ago

At this time of day, in this part of the country, localized entirely in your accounts?

[–] newIdentity@sh.itjust.works 8 points 1 year ago (5 children)

Not really though. Once the password has been leaked, it needs to be cracked. And that usually doesn't happen when the password is strong enough.

Except the password wasn't hashed but then the company belongs to get sued to bankruptcy

[–] randombullet@feddit.de 16 points 1 year ago (4 children)

That's also assuming they used proper salts and a strong hashing algorithm.

Also MITM and or phishing attacks are not super common but can also depreciate your common password very quickly.

Always layered defense. If it's not 1 thing, it could be another.

Unique passwords are just one facet on a multi-layered security defense.

load more comments (4 replies)
[–] Aurix@lemmy.world 8 points 1 year ago

Since you can never now for sure how a company handles hashing, always assume the worst. You will fare better.

load more comments (3 replies)
load more comments
view more: next ›