You definitely don’t want to be using these

  • sga@lemmings.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    1 day ago

    I am really surprised some common shit is not there, like hello, hello1234, abcd1234 (and other perms have numbers in front, etc)

      • psx_crab@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        Need your credit card number and the 3 digit number at the back of the card to see what i typed.

    • undefined@lemmy.hogru.ch
      link
      fedilink
      arrow-up
      6
      ·
      1 day ago

      From my experience brute forcing passwords, no. It’s smart enough to try character substitutions and it annoys me so much that the FBI recommends this practice.

      • psx_crab@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        Wait it’s not? I remember some people in the industry recommend this sort of password albeit with variation of other random words as it’s pretty strong and would take a very long time to crack.

        • locuester@lemmy.zip
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 day ago

          Indeed, just four impersonal words is a great password. Mix up the capitalization and it’s even better.

        • undefined@lemmy.hogru.ch
          link
          fedilink
          arrow-up
          2
          arrow-down
          3
          ·
          1 day ago

          If it’s a bunch of words found in any dictionary then with or without character substitution it’ll be easy to crack.

          • itslilith@lemmy.blahaj.zone
            link
            fedilink
            arrow-up
            3
            arrow-down
            1
            ·
            1 day ago

            It’s not. A dictionary has on the order of ≈100,000 (10^5) words in it. Picking five words entirely at random gives you 10^25 combinations, which is about the complexity of 14 alphanumeric characters. So pretty secure.

            • LostXOR@fedia.io
              link
              fedilink
              arrow-up
              4
              ·
              21 hours ago

              That’s true for a dictionary of 10^5 words. However the xkcd comic assumes a 2048 word dictionary, which only gives you 1.75 x 10^13 combinations. If your password is hashed with a weak algorithm, that can be cracked in minutes on a decent GPU. Luckily that can be fixed with just a few more words; 7 words gives you 1.5 x 10^23 combinations.

              I don’t really like the xkcd comic because it says the user shouldn’t be worried about offline attacks on hashed passwords. Unless you have a unique password for every service (best practice, but too much for the average user) using a password that is weak to offline attacks puts your other accounts at risk if one service has their password hashes leaked. Which does happen, a lot.

    • itslilith@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      That’s okay at best. Better if a passphrase, just random, impersonal words, something like this (~50 bits of entropy):

      “virtual raging vineyard clad runner”

      Best is a long, completely random string, stored in the password manager that you should be using anyways ~150 bits of entropy):

      “hX0hZ1QTWtQo(h[Ta9jH]TmsVIhUTgSE”

      • psx_crab@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        ·
        22 hours ago

        I did use a password manager, but issue is i still need password for the password manager so it can’t be random lol.

        • LostXOR@fedia.io
          link
          fedilink
          arrow-up
          2
          ·
          21 hours ago

          I just generated a 16 character random password and practiced typing it for a while; eventually it just becomes muscle memory.

  • IllNess@infosec.pub
    link
    fedilink
    arrow-up
    21
    arrow-down
    1
    ·
    2 days ago

    Hackers (1995) taught me the four most commonly used passwords are “love”, “sex”, “'secret”, and “god”.

    “secret” is there. “iloveyou” has love in it.

    I wonder how true that actually was in the 90s.

    • lemmyng@piefed.ca
      link
      fedilink
      English
      arrow-up
      17
      ·
      2 days ago

      Before password composition rules, those were actually quite common, as well as passwords that were just the same as the username. Heck, it wasn’t until that long ago that router manufacturers used to ship with admin/admin as the default credentials.

      • Ptsf@lemmy.world
        link
        fedilink
        arrow-up
        6
        ·
        2 days ago

        Honestly every networking company that couldn’t be bothered to ship with randomized creds physically embedded/etched somewhere on the device should’ve probably went out of business. The cost has always been minimal and the increased security value has always been readily apparent.

  • floofloof@lemmy.ca
    link
    fedilink
    arrow-up
    18
    ·
    2 days ago

    according to data from the password security website called NordPass all of which would take a hacker less than a second to crack. Take a look at this quality design to learn about popular passwords that you definitely shouldn’t use such as 123456 which was used 3 million times, 123456789 which was used 1.6 million times, 12345678 which was used 885 thousand times, “password” which was used 692 thousand times and qwerty123 which was used 643 thousand times.

    Is it normal for a password manager to be able to recognize which passwords are being used? Does this reflect badly on NordPass?

  • Lenny@lemmy.zip
    link
    fedilink
    arrow-up
    8
    ·
    1 day ago

    I see password and password1

    Mfw I’m sittin’ safe all the way down here at password69 😎

  • who@feddit.org
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 days ago

    I’m a little surprised not to see “changeme” on this list.