this post was submitted on 05 Jun 2024
240 points (95.5% liked)
Greentext
4399 readers
1432 users here now
This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.
Be warned:
- Anon is often crazy.
- Anon is often depressed.
- Anon frequently shares thoughts that are immature, offensive, or incomprehensible.
If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
That's just recommended to emphasize length. If your password is as long as a passphrase it's likely more secure (harder to remember though).
But if the point is to remember it, then you should use the security from length of series of 5+ random words. It’s easier to remember, write down, and type. All great characteristics of a master passphrase.
I don't disagree, sorry if it sounded like I did.
There's just a theoretical weakness since the base word lists are usually public knowledge and bruteforcers could (and probably already have) optimize for that.
The advantages of a passphrase outweigh though as you mentioned. An attacker would first need your repo anyway.
I'm adding obscure memes and anime references to my passphrases. Good luck bruteforcing that
Separating some of the words with random symbols also isn't too hard to remember and no chance that can be bruteforced.