this post was submitted on 05 Jun 2024
241 points (95.5% liked)

Greentext

4342 readers
1181 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 1 year ago
MODERATORS
 

Not a true greentext but I hope I have captured the spirit of it. (First time I wrote smth like this, don't be harsh on me. >w<)

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 17 points 5 months ago (1 children)

Yes, and the master should be a paraphrase not a password.

[–] [email protected] 8 points 5 months ago (1 children)

That's just recommended to emphasize length. If your password is as long as a passphrase it's likely more secure (harder to remember though).

[–] [email protected] 7 points 5 months ago (1 children)

But if the point is to remember it, then you should use the security from length of series of 5+ random words. It’s easier to remember, write down, and type. All great characteristics of a master passphrase.

[–] [email protected] 8 points 5 months ago (1 children)

I don't disagree, sorry if it sounded like I did.

There's just a theoretical weakness since the base word lists are usually public knowledge and bruteforcers could (and probably already have) optimize for that.

The advantages of a passphrase outweigh though as you mentioned. An attacker would first need your repo anyway.

[–] [email protected] 6 points 5 months ago (1 children)

I'm adding obscure memes and anime references to my passphrases. Good luck bruteforcing that

[–] [email protected] 1 points 5 months ago

Separating some of the words with random symbols also isn't too hard to remember and no chance that can be bruteforced.