this post was submitted on 27 Oct 2023
1301 points (98.1% liked)

Memes

44912 readers
2786 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 107 points 10 months ago (5 children)

The only good passwords are those you don't know yourself because they are randomly generated and all stored in your password manager of choice.

[–] [email protected] 60 points 10 months ago (4 children)

Until some locked down tv/console type device asks me for a password.

[–] [email protected] 59 points 10 months ago (10 children)

Then you look up the random string of 36 characters once, think "why did I make this one 36 characters" as you painstakingly type it in with a TV remote, then immediately forget it as soon as you're logged in.

[–] [email protected] 20 points 10 months ago (2 children)

Then repeat this process every few months the device decides it needs to ask the password of you again. Not playing this game

[–] [email protected] 9 points 10 months ago (1 children)

Take the TV throw it out of the window.

Buy a minipc and plugin a cheap Monitor via hdmi.

Setup kodi or similar on your minipc and you won't even have ads anymore because you will of course install pihole too.

load more comments (1 replies)
load more comments (1 replies)
load more comments (9 replies)
[–] [email protected] 11 points 10 months ago (6 children)

I use an off-line libre password manager for several bad designed goverment stuff that only accept numbers as passwords or don't allow to paste it.

It's not that hard and I easily get used to it. I read it, type it and forget it again.

load more comments (6 replies)
load more comments (2 replies)
[–] [email protected] 37 points 10 months ago (1 children)

it's all fun and games until you don't have access to your password manager

load more comments (1 replies)
[–] [email protected] 15 points 10 months ago (1 children)

depends on the password manager....

also, the length of the password is WAY more important than it being randomly generated as long as it's not in a password dictionary somewhere. I use 20+ character passphrases that i can easily remember everywhere for instance

[–] [email protected] 9 points 10 months ago (5 children)

My strategy is to have a persistent short passphrase that's within every password I use, and pair it with a silly bastardization of the service I have an account for. So, for example, if my passphrase were hunter2 (lol) and I had an account on Netflix, my password for Netflix might be something like hunter2NutFlex. Because of this, I can manage my own passwords in basic text as "code NutFlex" because the "code" portion is encrypted in my own fucking brain. If Netflix gets hacked, somebody has a password that only works with Netflix, and they'd need my text file as a Rosetta Stone to acquire my other passwords. Not impossible, but who the fuck am I and why would anybody dig that deep to do that to me?

I'm no IT expert, so somebody tell me if this is a stupid and overly vulnerable strategy. I thought I was pretty brilliant for coming up with this and rolling it out several years ago.

load more comments (5 replies)
load more comments (2 replies)
[–] [email protected] 37 points 10 months ago (6 children)

Imagine a site telling you "Sorry, you can't use asdf123 as your password: you've already used it on that other site".

load more comments (6 replies)
[–] [email protected] 36 points 10 months ago* (last edited 10 months ago) (3 children)

Counterpoint: Password Manager = One point of failure

Multiple Strong Passwords that have to be changed every 3 months even to sign on to your cornerstore rewards program without a password manager? Guess you're never accessing any account older than 3 months because you've forgotten th3 b1lli0n$ oF s+r0ng p4s5w0rds Y0u h4Ve cr3atEd!

[–] [email protected] 25 points 10 months ago (1 children)

Actually you are the single point of failure

https://xkcd.com/538/

load more comments (1 replies)
[–] [email protected] 14 points 10 months ago (3 children)

That's...not a counterpoint.

You can have strong authentication on your central password manager, and have an encrypted container protecting it.

There is no logical argument against password vaults as a concept. There are bad implementations of specific password vaults, but a password vault is the answer for the highest possible password based security available in 2023.

load more comments (3 replies)
[–] [email protected] 9 points 10 months ago* (last edited 10 months ago) (5 children)

Okay and now let's get into threat modelling and risk management.

What is the purpose of a password manager? What are the possible threats against them, and what are those against singular passwords for services? What is the risk of each of those?

load more comments (5 replies)
[–] [email protected] 29 points 10 months ago (1 children)

So your password is cardboard fort?

[–] [email protected] 37 points 10 months ago (3 children)
[–] [email protected] 21 points 10 months ago (3 children)
load more comments (3 replies)
load more comments (2 replies)
[–] [email protected] 21 points 10 months ago (4 children)

Just use a password manager, then you get the benefits of having a single password to remember without the security-related downsides.

[–] [email protected] 19 points 10 months ago (4 children)

I never got over the fact that I somehow need to trust to an absurdly high degree a proprietary software to store ALL my passwords. Is this really a good idea?

[–] [email protected] 24 points 10 months ago (5 children)

You can use KeePass, but you'll have to figure out a way to have your password vault available on other devices (can do it by using any cloud shares, i.e. GDrive). This way you'll be in charge of almost every aspect of your passwords. But you'll have to take care of backups and keep everything in sync.

[–] [email protected] 13 points 10 months ago (3 children)

KeePass

I'm sorry but no. I'm physically incapable of not moving the capital letter one space and I'm not entrusting my passwords to what I've irrationally decided IS named KeepAss. I just can't.

[–] [email protected] 13 points 10 months ago

I like Vaultwarden. Open source rust server compatible with bitwarden.

[–] [email protected] 10 points 10 months ago

And then there's KeePassXC.

Get it? Keep-Ass-Sexy :)

https://en.wikipedia.org/wiki/KeePassXC

[–] Honytawk 7 points 10 months ago (1 children)

Just imagine keeping your passwords in your ass and you should be fine.

load more comments (1 replies)
[–] [email protected] 9 points 10 months ago (1 children)

Or simply can use, Bitwarden or Protonpass

load more comments (1 replies)
load more comments (3 replies)
[–] [email protected] 11 points 10 months ago (8 children)

There are libre off-line password managers. Variants of Keepass for example.

Indeed it's a bad idea to store passwords in a propietary system. Specially a cloud based one being hacked time to time, like 1password.

load more comments (8 replies)
load more comments (2 replies)
[–] [email protected] 9 points 10 months ago (8 children)

So all my passwords are locked behind a single password? Isnt this essentially the same as using the same password for every site. In that they only need to cracl o e password to have access to everything?

[–] [email protected] 20 points 10 months ago

The danger of using the same password everywhere is from leaks caused by poor security in one of those sites.

Passwords getting leaked are almost always unrelated to how strong the passwords are and has more to do with how those password are stored, and what protection measures they have against unauthorized people accessing them.

No one is ever going to "crack" your single password for your password manager as long as it is a strong password, though you might write it down in your wallet and lose it in a busy station, just like some administrator of a website might forget to close outside access to their mysql database containing unencrypted plaintext passwords.

load more comments (7 replies)
load more comments (2 replies)
[–] [email protected] 17 points 10 months ago

It was literally a battle for me to have a strong unique password for our baby monitor... Wife was not happy about that but I came out on top.

[–] [email protected] 17 points 10 months ago (8 children)

Everyone talks about password managers these days, but isn't that telling the hackers exactly where to go to get all your passwords? Seems like a much higher chance of catastrophic failure to me if you have a single point of entry.

[–] [email protected] 18 points 10 months ago (6 children)

Yes that's definitely a concern to keep in mind.

The problem is that if someone doesn't use a password manager they're morenlikely to reuse weak ones.

Using a password manager is a better path, as long as there is awareness on how to keep it secured.

load more comments (6 replies)
[–] [email protected] 11 points 10 months ago (14 children)

Only if you're using a third-party password manager, rather than something stored/managed locally.

load more comments (14 replies)
[–] [email protected] 9 points 10 months ago (1 children)

I just use a password manager for my password managers password manager. 2fa on all of em. Takes me forever to login

[–] [email protected] 8 points 10 months ago (3 children)

I dunno, doesn't sound like enough layers to me. We can go deeper

load more comments (3 replies)
load more comments (5 replies)
[–] [email protected] 12 points 10 months ago* (last edited 10 months ago) (1 children)

I've actually come up with a way to have a complex and unique password for each service which is also resilient againt forced password changes, doenst require a password manager, and if Im being tortured I still wont be able to tell them what it is because I dont know it unless Im at the login screen. If the service changes the layout of their login screen though, Im fucked.

[–] [email protected] 8 points 10 months ago (1 children)
[–] [email protected] 9 points 10 months ago (1 children)

It must be some sort of compression algorithm of the information presented at the log-in screen.

[–] [email protected] 16 points 10 months ago (8 children)

If they change/rebrand the login he's screwed. Just use a password manager people.

load more comments (8 replies)
[–] [email protected] 10 points 10 months ago* (last edited 10 months ago)

I came up with a formula for my passwords - as easy to remember as a single password and makes a unique login for every site feasible without a password manager. Can be updated as often as you like and all you gotta do is remember the latest version of the formula. At the very least, the hashes will be different and it'd take someone having more than two of my passwords to figure out the pattern.

I also use over 100 email aliases with my own domain name so that my most important accounts have a separate login that isn't a common domain that wouldn't be easy for someone to guess.

It would take a lot of concentrated effort for someone to get at any of my important accounts, and even my less important ones would be pretty difficult to get into even if multiple accounts are compromised, due to using a smaller pool of aliases under common domains for less important accounts.

Someone got into half a dozen of my accounts a few years ago and I finally started taking security seriously.

[–] [email protected] 9 points 10 months ago

At this time of day, in this part of the country, localized entirely in your accounts?

[–] [email protected] 8 points 10 months ago (5 children)

Not really though. Once the password has been leaked, it needs to be cracked. And that usually doesn't happen when the password is strong enough.

Except the password wasn't hashed but then the company belongs to get sued to bankruptcy

[–] [email protected] 16 points 10 months ago (4 children)

That's also assuming they used proper salts and a strong hashing algorithm.

Also MITM and or phishing attacks are not super common but can also depreciate your common password very quickly.

Always layered defense. If it's not 1 thing, it could be another.

Unique passwords are just one facet on a multi-layered security defense.

load more comments (4 replies)
[–] [email protected] 8 points 10 months ago

Since you can never now for sure how a company handles hashing, always assume the worst. You will fare better.

load more comments (3 replies)
load more comments
view more: next ›