this post was submitted on 15 Sep 2024
473 points (99.4% liked)

196

16449 readers
1868 users here now

Be sure to follow the rule before you head out.

Rule: You must post before you leave.

^other^ ^rules^

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[โ€“] Viking_Hippie@lemmy.world 4 points 1 month ago* (last edited 1 month ago) (2 children)

Until you get hit with a dictionary attack.

As I explained to the other one, no dictionary attack will happen upon that exact combination of words any faster than the keyboard mashing preceding it.

Using a COMMON word or a COMMON phrase would leave you vulnerable, sure, but no prediction process is going to happen on the exact combination.

Hell, add a word or two to "SaltyIceteaMaker" and it would make an extremely secure pass phrase. For something without that string in the user id, of course ๐Ÿ˜

[โ€“] Johanno@feddit.org 3 points 1 month ago (1 children)

The main advantage of a password manager is that you can have a different password for each account. Which means in case of a leak you won't be in risk of losing other accounts.

And I don't think I want to remember 300 pass phrases with different words.

[โ€“] Viking_Hippie@lemmy.world 0 points 1 month ago* (last edited 1 month ago) (1 children)

The main advantage of a password manager is that you can have a different password for each account. Which means in case of a leak you won't be in risk of losing other accounts

Except it's the opposite: if someone gets the master password for your password manager, that's all of them.

And I don't think I want to remember 300 pass phrases with different words.

~~That's another advantage of the pass phrase over the easily remembered password: repeating an uncrackable passphrase doesn't pose the risk that repeating a guessable password.~~

~~You can use RentMauriceHouseHurryNow for all your accounts and they'll all be safer than a billion different strings protected by a single guessable master password.~~

Especially if you're not in the tiny minority of people who actually knows a Maurice who isn't called The Space Cowboy by some people.

[โ€“] Johanno@feddit.org 5 points 1 month ago (1 children)

Using the same password (no matter how secure it is) for all accounts is a bad idea.

Assuming you have at least 20 accounts with sensible data, and you don't even remember that 5 of them exist.

Now shittywebsite.xy gets hacked and all data is unencrypted and unhashed.

So now your.email@adress.com with yourSecu4ePassPhrase is leaked.

You now quickly try to change the password on 15 accounts with the same email and password. But you forgot the 5 accounts you made years ago. Now after some time hackers login into the the old accounts and get your credit card info or whatever.

Great idea!

Yes my password manager is a single point of failure, but it is one I personally control and have the view over.

[โ€“] Viking_Hippie@lemmy.world 2 points 1 month ago

Good point.

A series of pass phrases that you can remember yourself is still better than relying on a password manager that can ALSO expose all of your passwords, none of which you remember.

[โ€“] SaltyIceteaMaker@lemmy.ml 1 points 1 month ago (1 children)

It's still less combinations than just scramble tho. It may be enough idk, but an algorithm that just combines words would definitely at some point arrive at like "SaltyIceteaMakerBlueAcorn" it's only once you add random letters/numbers/special characters that a dictionary attack stops working.

Although this probably doesn't matter as it would likely still take like a century or ten to complete

[โ€“] Viking_Hippie@lemmy.world 0 points 1 month ago (1 children)

It's still less combinations than just scramble tho

Not in any meaningful way, no. There's what, hundreds of thousands of words in the English language? With no apparent pattern, that's a near-infinite number of possible combinations of 5 or 6 word phrases.

Add that most password crackers would use another kind of attack that presupposes that there's numbers and special characters and you really have redundancy on redundancy.

an algorithm that just combines words would definitely at some point arrive at like "SaltyIceteaMakerBlueAcorn"

Not within your lifespan or even that of humanity.

it's only once you add random letters/numbers/special characters that a dictionary attack stops working.

That's just not true if you don't consider "might theoretically get there in a million years" as "working".

Although this probably doesn't matter as it would likely still take like a century or ten to complete

Exactly. So your entire point is moot. A password or passphrase doesn't need to hold for longer than the existence of the account (or whatever's being protected by it), the user, or the species of the user.

[โ€“] SaltyIceteaMaker@lemmy.ml 2 points 1 month ago (1 children)

Chill bro it was just me rambling about and even arguing against myself. Didn't have to make a whole callout post lol

[โ€“] Viking_Hippie@lemmy.world 2 points 1 month ago (1 children)

I was just answering your arguments and didn't want to let all of that mental work go to waste when I saw the reveal at the very bottom ๐Ÿ˜„