@ArborealTechie @PerryM seriously, I had to have a max. 8 character password with only numbers and letters, no spaces. And it was case insensitive.
Luckily, this is not still the case.
@pthane @PortsmouthGreens @PerryM Yes it does help a lot!
For every attack, we must assume that the attacker knows how we created the password. But still, this increases the number of possible words, so it helps.
To reference my own table again:
https://chaos.social/@Septem9er/110260038180253016
There you can see how much of a difference a bigher wordlist (2024 vs. 7776) makes (first row).
The important thing here is: The passphrase must be created truly random. Not in your head.
Attached: 3 images In case anyone else is interested on a comparison of passphrases vs. passwords, here is the result. Number in the top row refers to the number of words in the #wordlist and the hardware used. The number in the first column refers to the number of words in the #passphrase For comparison the original table for passwords from hive systems. We assume the attacker knows we use a passphrase and uses a wordlist attack. Other than that method and calculation basis as in: https://www.hivesystems.io/blog/are-your-passwords-in-the-green
@PortsmouthGreens @PerryM I used diceware with real dice for a while, but I got tired of the passwords taking so long to type, so I wrote my own pronounceable password generator a while ago: https://github.com/curtmack/mantra
(One of these days I should look into migrating off of GitHub, too)
@PerryM What matters is randomness and entropy, see https://en.wikipedia.org/wiki/Password_strength#Random_passwords.
Humans can't easily remember or type special characters, they should use a password manager for that or use a random list of words, that is much easier to remember and, with enough words, as strong or stronger than any list with special characters. Only drawback: it is longer.
@PerryM Indeed. But I'm pleased to see that breaking my master passwords is still into many billions of years, even on #ChatGPT-level hardware.
Very long encryption keys can be easy to remember (a couple of lines from your favourite song, for example), and, provided they're never stored on disk or passed over a network, are really vulnerable only to sophisticated malware on the client (keyloggers or memory snoopers).
@laird @drag0nsden @PerryM I assume it’s because it’s based on current computing power. I don’t know how fast it goes down but (wild assumption) if it goes down by 50% every year a password that takes 100k years with current hardware will take 3 months in 20 years. So that would mean it’s basically 20 (or even 18 if you start cracking in 17 years) years not 100k.
That’s probably fine for most use cases though, pretty sure there’s nothing I’m currently doing that anyone is going to be interested in in 20 years.
@PerryM guess why even the weakest passwords of mine are 16 digits numbers, lowercase, uppercase & symbols?
And those are the ones I only choose if I can't go with 64 or more digits...
All individualized and secured with a #PasswordManager ...
I second the table and the advises. However, I think that the colour choices are a bit pessimistic. More than a month of bruteforce should be at least yellow. A couple of years is definitely a safe for me.
@PerryM I think I need to think of paswords with at least 11 characters, lower case, upper case, symbols and numbers.
Then change the password annually.
A new "password-guessing" AI bot was given 15 million real passwords, and it correctly guessed 81% of them within a month after starting (with a full 50% guessed in less than one minute). The 19% that weren't guessed all had over 18 characters and were a random mix of upper and lowercase letters, numbers and symbols, so let that guide your password creations from now on. https://9to5mac.com/2023/04/07/ai-cracks-passwords-this-fast-how-to-protect/