this post was submitted on 27 Oct 2023
1301 points (98.0% liked)

Memes

45578 readers
1288 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 107 points 1 year ago (5 children)

The only good passwords are those you don't know yourself because they are randomly generated and all stored in your password manager of choice.

[–] [email protected] 60 points 1 year ago (4 children)

Until some locked down tv/console type device asks me for a password.

[–] [email protected] 59 points 1 year ago (9 children)

Then you look up the random string of 36 characters once, think "why did I make this one 36 characters" as you painstakingly type it in with a TV remote, then immediately forget it as soon as you're logged in.

[–] [email protected] 20 points 1 year ago (2 children)

Then repeat this process every few months the device decides it needs to ask the password of you again. Not playing this game

[–] [email protected] 9 points 1 year ago (1 children)

Take the TV throw it out of the window.

Buy a minipc and plugin a cheap Monitor via hdmi.

Setup kodi or similar on your minipc and you won't even have ads anymore because you will of course install pihole too.

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 7 points 1 year ago (1 children)

Ugh, I hate typing with the remote so fucking much! It's worse than having a mild case of covid-19.

load more comments (1 replies)
load more comments (7 replies)
[–] [email protected] 11 points 1 year ago (6 children)

I use an off-line libre password manager for several bad designed goverment stuff that only accept numbers as passwords or don't allow to paste it.

It's not that hard and I easily get used to it. I read it, type it and forget it again.

load more comments (6 replies)
load more comments (2 replies)
[–] [email protected] 37 points 1 year ago (1 children)

it's all fun and games until you don't have access to your password manager

load more comments (1 replies)
[–] [email protected] 15 points 1 year ago (1 children)

depends on the password manager....

also, the length of the password is WAY more important than it being randomly generated as long as it's not in a password dictionary somewhere. I use 20+ character passphrases that i can easily remember everywhere for instance

[–] [email protected] 9 points 1 year ago (5 children)

My strategy is to have a persistent short passphrase that's within every password I use, and pair it with a silly bastardization of the service I have an account for. So, for example, if my passphrase were hunter2 (lol) and I had an account on Netflix, my password for Netflix might be something like hunter2NutFlex. Because of this, I can manage my own passwords in basic text as "code NutFlex" because the "code" portion is encrypted in my own fucking brain. If Netflix gets hacked, somebody has a password that only works with Netflix, and they'd need my text file as a Rosetta Stone to acquire my other passwords. Not impossible, but who the fuck am I and why would anybody dig that deep to do that to me?

I'm no IT expert, so somebody tell me if this is a stupid and overly vulnerable strategy. I thought I was pretty brilliant for coming up with this and rolling it out several years ago.

load more comments (5 replies)
load more comments (2 replies)
[–] [email protected] 37 points 1 year ago (6 children)

Imagine a site telling you "Sorry, you can't use asdf123 as your password: you've already used it on that other site".

load more comments (6 replies)
[–] [email protected] 36 points 1 year ago* (last edited 1 year ago) (3 children)

Counterpoint: Password Manager = One point of failure

Multiple Strong Passwords that have to be changed every 3 months even to sign on to your cornerstore rewards program without a password manager? Guess you're never accessing any account older than 3 months because you've forgotten th3 b1lli0n$ oF s+r0ng p4s5w0rds Y0u h4Ve cr3atEd!

[–] [email protected] 25 points 1 year ago (1 children)

Actually you are the single point of failure

https://xkcd.com/538/

load more comments (1 replies)
[–] [email protected] 14 points 1 year ago (3 children)

That's...not a counterpoint.

You can have strong authentication on your central password manager, and have an encrypted container protecting it.

There is no logical argument against password vaults as a concept. There are bad implementations of specific password vaults, but a password vault is the answer for the highest possible password based security available in 2023.

load more comments (3 replies)
[–] [email protected] 9 points 1 year ago* (last edited 1 year ago) (5 children)

Okay and now let's get into threat modelling and risk management.

What is the purpose of a password manager? What are the possible threats against them, and what are those against singular passwords for services? What is the risk of each of those?

load more comments (5 replies)
[–] [email protected] 29 points 1 year ago (1 children)

So your password is cardboard fort?

[–] [email protected] 37 points 1 year ago (3 children)
[–] [email protected] 21 points 1 year ago (3 children)
load more comments (3 replies)
load more comments (2 replies)
[–] [email protected] 21 points 1 year ago (4 children)

Just use a password manager, then you get the benefits of having a single password to remember without the security-related downsides.

[–] [email protected] 19 points 1 year ago (4 children)

I never got over the fact that I somehow need to trust to an absurdly high degree a proprietary software to store ALL my passwords. Is this really a good idea?

[–] [email protected] 24 points 1 year ago (5 children)

You can use KeePass, but you'll have to figure out a way to have your password vault available on other devices (can do it by using any cloud shares, i.e. GDrive). This way you'll be in charge of almost every aspect of your passwords. But you'll have to take care of backups and keep everything in sync.

[–] [email protected] 13 points 1 year ago (4 children)

KeePass

I'm sorry but no. I'm physically incapable of not moving the capital letter one space and I'm not entrusting my passwords to what I've irrationally decided IS named KeepAss. I just can't.

[–] [email protected] 13 points 1 year ago

I like Vaultwarden. Open source rust server compatible with bitwarden.

[–] [email protected] 10 points 1 year ago

And then there's KeePassXC.

Get it? Keep-Ass-Sexy :)

https://en.wikipedia.org/wiki/KeePassXC

load more comments (2 replies)
[–] [email protected] 9 points 1 year ago (1 children)

Or simply can use, Bitwarden or Protonpass

load more comments (1 replies)
load more comments (3 replies)
[–] [email protected] 11 points 1 year ago (8 children)

There are libre off-line password managers. Variants of Keepass for example.

Indeed it's a bad idea to store passwords in a propietary system. Specially a cloud based one being hacked time to time, like 1password.

load more comments (8 replies)
load more comments (2 replies)
[–] [email protected] 9 points 1 year ago (8 children)

So all my passwords are locked behind a single password? Isnt this essentially the same as using the same password for every site. In that they only need to cracl o e password to have access to everything?

[–] [email protected] 7 points 1 year ago

In theory, yes but if you use a good password manager and have a strong master password the encryption should be practically impossible to break. The fact that you only have to remember one password means that this password can and should be a very strong one. 20+ characters with upper and lowercase letters, numbers and symbols should take centuries to crack.

load more comments (6 replies)
load more comments (2 replies)
[–] [email protected] 17 points 1 year ago (8 children)

Everyone talks about password managers these days, but isn't that telling the hackers exactly where to go to get all your passwords? Seems like a much higher chance of catastrophic failure to me if you have a single point of entry.

[–] [email protected] 18 points 1 year ago (6 children)

Yes that's definitely a concern to keep in mind.

The problem is that if someone doesn't use a password manager they're morenlikely to reuse weak ones.

Using a password manager is a better path, as long as there is awareness on how to keep it secured.

load more comments (6 replies)
[–] [email protected] 11 points 1 year ago (14 children)

Only if you're using a third-party password manager, rather than something stored/managed locally.

load more comments (14 replies)
[–] [email protected] 9 points 1 year ago (1 children)

I just use a password manager for my password managers password manager. 2fa on all of em. Takes me forever to login

[–] [email protected] 8 points 1 year ago (3 children)

I dunno, doesn't sound like enough layers to me. We can go deeper

load more comments (3 replies)
load more comments (5 replies)
[–] [email protected] 17 points 1 year ago

It was literally a battle for me to have a strong unique password for our baby monitor... Wife was not happy about that but I came out on top.

[–] [email protected] 12 points 1 year ago* (last edited 1 year ago) (1 children)

I've actually come up with a way to have a complex and unique password for each service which is also resilient againt forced password changes, doenst require a password manager, and if Im being tortured I still wont be able to tell them what it is because I dont know it unless Im at the login screen. If the service changes the layout of their login screen though, Im fucked.

[–] [email protected] 8 points 1 year ago (1 children)
[–] [email protected] 9 points 1 year ago (1 children)

It must be some sort of compression algorithm of the information presented at the log-in screen.

[–] [email protected] 16 points 1 year ago (8 children)

If they change/rebrand the login he's screwed. Just use a password manager people.

load more comments (8 replies)
[–] [email protected] 10 points 1 year ago* (last edited 1 year ago)

I came up with a formula for my passwords - as easy to remember as a single password and makes a unique login for every site feasible without a password manager. Can be updated as often as you like and all you gotta do is remember the latest version of the formula. At the very least, the hashes will be different and it'd take someone having more than two of my passwords to figure out the pattern.

I also use over 100 email aliases with my own domain name so that my most important accounts have a separate login that isn't a common domain that wouldn't be easy for someone to guess.

It would take a lot of concentrated effort for someone to get at any of my important accounts, and even my less important ones would be pretty difficult to get into even if multiple accounts are compromised, due to using a smaller pool of aliases under common domains for less important accounts.

Someone got into half a dozen of my accounts a few years ago and I finally started taking security seriously.

[–] [email protected] 9 points 1 year ago

At this time of day, in this part of the country, localized entirely in your accounts?

[–] [email protected] 8 points 1 year ago (5 children)

Not really though. Once the password has been leaked, it needs to be cracked. And that usually doesn't happen when the password is strong enough.

Except the password wasn't hashed but then the company belongs to get sued to bankruptcy

[–] [email protected] 16 points 1 year ago (4 children)

That's also assuming they used proper salts and a strong hashing algorithm.

Also MITM and or phishing attacks are not super common but can also depreciate your common password very quickly.

Always layered defense. If it's not 1 thing, it could be another.

Unique passwords are just one facet on a multi-layered security defense.

load more comments (4 replies)
[–] [email protected] 8 points 1 year ago

Since you can never now for sure how a company handles hashing, always assume the worst. You will fare better.

load more comments (3 replies)
load more comments
view more: next ›