oneFishtwoFishthreeFishfourFuckyou

  • bluGill@fedia.io
    link
    fedilink
    arrow-up
    3
    ·
    5 hours ago

    It is called salt and useful so long as the main part of the password is generally secure without. I have a couple common things I add to any password I have to create (generally meaning my password manager’s automatic generation is rejected), but this is only useful because I figure humans won’t guess the rest (nor will they feed that into a computer to guess the rest which probably isn’t long enough to be secure alone), and the whole then becomes long enough that a computer can’t brute force it. Note that I don’t always use exactly the same sale factors and I don’t put them in the same place - if you know what I try you can brute force my hand generated passwords with a computer but the job is much harder in hopes that you give up.

    But if at all possible I will prefer to use a generate password from my password manager which is even more secure. Humans are very bad are creating passwords - even humans who know all the things to get wrong tend to be bad at it.

  • toynbee@piefed.social
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 hours ago

    An erstwhile co-worker used to create passwords by stringing together the names of porn actresses and, I think, adding two random numbers at the end.

    Before I started working with them, apparently they almost told the owner of the company this, but were talked down by some other compatriots.

    • PoastRotato@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      7 hours ago

      Maybe I’m misunderstanding the graphics, but why the hell is a password that would take 9000 years to crack not considered secure enough to be colored green? What context would even realistically allow for the password to still be relevant at that point?

    • Rhaedas@fedia.io
      link
      fedilink
      arrow-up
      5
      ·
      8 hours ago

      A long password made of different parts that you can remember in your head is far more secure than any manager that can get hacked.

    • starlinguk@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      2
      ·
      9 hours ago

      I use obscure quotes and turn letters into numbers. Example (of a quote that isn’t obscure):

      Once more into the breach, my friends.

      becomes

      0m1tb, mf!

      • toynbee@piefed.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 hours ago

        That reminds me of a novel based on the HALO universe. In it, a minor character has the password `ThereOnceWasAGirl`. However, he has to type it twice to start his shift because he accidentally didn’t capitalize a letter, I think the W, when typing it.

        I read that as a teenager. I didn’t understand why the author included that detail then and I don’t now.

  • Redfox8@mander.xyz
    link
    fedilink
    arrow-up
    1
    ·
    8 hours ago

    I once got annoyed that my apparently OK password wasn’t being accepted so went with fuckaduck plus some numbers!

  • thelittleblackbird@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    9 hours ago

    The point is… It does not really matter, as long as your password is not trivial the security relies more in the algorithm than in the chosen password.

    With bcrypt + round parameters, password stretching or any other key derivation technique, even weak passwords cant be cracked in a realistic time frame