Skip to content
0
  • Home
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
  • Home
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Sketchy)
  • No Skin
Collapse

Wandering Adventure Party

  1. Home
  2. RPGMemes
  3. Reminder to use strong passwords

Reminder to use strong passwords

Scheduled Pinned Locked Moved RPGMemes
rpgmemes
36 Posts 19 Posters 8 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • nocturne@slrpnk.netN nocturne@slrpnk.net

    Diceware is a password locker?

    S This user is from outside of this forum
    S This user is from outside of this forum
    sirblastalot@ttrpg.network
    wrote last edited by
    #15

    Diceware is a method of generating random memorable passwords.

    nocturne@slrpnk.netN 1 Reply Last reply
    1
    • G graybackgroundmusic@lemmy.zip

      I like the CorrectHorseBatteryStaple methodology.

      Link Preview Image
      Password Strength

      favicon

      xkcd (xkcd.com)

      S This user is from outside of this forum
      S This user is from outside of this forum
      sirblastalot@ttrpg.network
      wrote last edited by
      #16

      Basically what diceware does. It’s just that humans are really bad at picking random words (“banana” is over represented, for instance) that’s what diceware helps with.

      C G 2 Replies Last reply
      4
      • S sirblastalot@ttrpg.network

        Diceware is a method of generating random memorable passwords.

        nocturne@slrpnk.netN This user is from outside of this forum
        nocturne@slrpnk.netN This user is from outside of this forum
        nocturne@slrpnk.net
        wrote last edited by
        #17

        I would suggest a password locker rather than just a generated passphrase.

        1 Reply Last reply
        0
        • kairubyte@lemmy.dbzer0.comK kairubyte@lemmy.dbzer0.com

          “Password must be between 8 and 12 characters” 🤦🏻‍♂️

          C This user is from outside of this forum
          C This user is from outside of this forum
          cassandrafatigue@lemmy.dbzer0.com
          wrote last edited by cassandrafatigue@lemmy.dbzer0.com
          #18

          'Pass word1!

          Oh, ’ and spaces aren’t allowed?

          festnt@sh.itjust.worksF 1 Reply Last reply
          6
          • S sirblastalot@ttrpg.network

            Basically what diceware does. It’s just that humans are really bad at picking random words (“banana” is over represented, for instance) that’s what diceware helps with.

            C This user is from outside of this forum
            C This user is from outside of this forum
            cassandrafatigue@lemmy.dbzer0.com
            wrote last edited by
            #19

            I used to use words from different vernaculars or languages. Sometimes i double check they are too abstract and weird to correct horse battery staple easily just because I’m a contrarian asshole snd thst helps me remember. exquisitevibrattoacquittalbevelschaudenfreude

            1 Reply Last reply
            2
            • S sirblastalot@ttrpg.network

              Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don’t already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn’t actually do.

              I recommend Diceware! I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!

              EDIT: Oh, also, all that numbers and symbols shit is no longer considered good practice. Just make it a really long collection of random words, at least 12, ideally 16+ characters. And make sure the words are actually random; your 3 favorite sports teams isn’t good enough, which is why I recommend diceware.

              K This user is from outside of this forum
              K This user is from outside of this forum
              kieron115@startrek.website
              wrote last edited by
              #20

              Horse: “That’s a battery staple.”

              Man: “Correct!”

              1 Reply Last reply
              5
              • G graybackgroundmusic@lemmy.zip

                I like the CorrectHorseBatteryStaple methodology.

                Link Preview Image
                Password Strength

                favicon

                xkcd (xkcd.com)

                K This user is from outside of this forum
                K This user is from outside of this forum
                kieron115@startrek.website
                wrote last edited by
                #21

                these are called pass phrases and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.

                F G 2 Replies Last reply
                7
                • S sirblastalot@ttrpg.network

                  Password managers are OK but I have hesitations on them personally. I’m leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you’re not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I’m not advocating for any particular method, just putting it out there so people can make an informed decision.

                  Q This user is from outside of this forum
                  Q This user is from outside of this forum
                  quetzalcutlass@lemmy.world
                  wrote last edited by quetzalcutlass@lemmy.world
                  #22

                  I’m leery of putting all my most high-value stuff in one place behind one password.

                  Password managers (at least the non-browser based ones) use methods provided by the OS to protect themselves from screen recording, direct memory reading and keyboard-sniffing. Most password managers can also be set up to require a keyfile and/or physical passkey to unlock their databases.

                  A keyfile stores data necessary for decryption separate from the password database and means someone couldn’t get into your passwords even if your database was stolen and they knew the master password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself). A keyfile also lets you keep your database on cloud storage while manually transferring the key to trusted devices, allowing cloud syncing of your passwords without fear of leaks - without the keyfile it’s all just random data.

                  A physical passkey makes it virtually impossible to breach the database unless someone steals the USB device, since it uses a challenge-response model and the data needed to spoof it should never leave the device.

                  S 1 Reply Last reply
                  4
                  • S sirblastalot@ttrpg.network

                    Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don’t already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn’t actually do.

                    I recommend Diceware! I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!

                    EDIT: Oh, also, all that numbers and symbols shit is no longer considered good practice. Just make it a really long collection of random words, at least 12, ideally 16+ characters. And make sure the words are actually random; your 3 favorite sports teams isn’t good enough, which is why I recommend diceware.

                    Aielman15A This user is from outside of this forum
                    Aielman15A This user is from outside of this forum
                    Aielman15
                    wrote last edited by aielman15@lemmy.world
                    #23

                    Over the years, nobody has ever guessed my passwords, but four sites I was subscribed to were compromised and my email+password got leaked anyway.

                    The strongest chain and the weakest link…

                    1 Reply Last reply
                    6
                    • Q quetzalcutlass@lemmy.world

                      I’m leery of putting all my most high-value stuff in one place behind one password.

                      Password managers (at least the non-browser based ones) use methods provided by the OS to protect themselves from screen recording, direct memory reading and keyboard-sniffing. Most password managers can also be set up to require a keyfile and/or physical passkey to unlock their databases.

                      A keyfile stores data necessary for decryption separate from the password database and means someone couldn’t get into your passwords even if your database was stolen and they knew the master password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself). A keyfile also lets you keep your database on cloud storage while manually transferring the key to trusted devices, allowing cloud syncing of your passwords without fear of leaks - without the keyfile it’s all just random data.

                      A physical passkey makes it virtually impossible to breach the database unless someone steals the USB device, since it uses a challenge-response model and the data needed to spoof it should never leave the device.

                      S This user is from outside of this forum
                      S This user is from outside of this forum
                      sirblastalot@ttrpg.network
                      wrote last edited by
                      #24

                      I guess what I mean is, it’s a single point of failure. Usually an extremely strong one, granted.

                      nocturne@slrpnk.netN 1 Reply Last reply
                      3
                      • K kieron115@startrek.website

                        these are called pass phrases and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.

                        F This user is from outside of this forum
                        F This user is from outside of this forum
                        felbane@lemmy.world
                        wrote last edited by
                        #25

                        Well good news then, because even throwing every quantum computer currently on the planet is not enough to factor 2048-bit RSA, and likely won’t be in any currently alive human’s lifetime.

                        K 1 Reply Last reply
                        0
                        • F felbane@lemmy.world

                          Well good news then, because even throwing every quantum computer currently on the planet is not enough to factor 2048-bit RSA, and likely won’t be in any currently alive human’s lifetime.

                          K This user is from outside of this forum
                          K This user is from outside of this forum
                          kieron115@startrek.website
                          wrote last edited by
                          #26

                          Maybe with current quantum computers, but human technology tends to increase at an exponential rate so I doubt it will be long. Scientists are already trying to design post-quantum encryption for this very reason.

                          Link Preview Image
                          NIST Releases First 3 Finalized Post-Quantum Encryption Standards

                          NIST is encouraging computer system administrators to begin transitioning to the new standards as soon as possible

                          favicon

                          NIST (www.nist.gov)

                          1 Reply Last reply
                          1
                          • S sirblastalot@ttrpg.network

                            I guess what I mean is, it’s a single point of failure. Usually an extremely strong one, granted.

                            nocturne@slrpnk.netN This user is from outside of this forum
                            nocturne@slrpnk.netN This user is from outside of this forum
                            nocturne@slrpnk.net
                            wrote last edited by
                            #27

                            And your memory is not a single point of failure?

                            S 1 Reply Last reply
                            1
                            • K kieron115@startrek.website

                              these are called pass phrases and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.

                              G This user is from outside of this forum
                              G This user is from outside of this forum
                              graybackgroundmusic@lemmy.zip
                              wrote last edited by
                              #28

                              until quantum computers render all traditional cryptography meaningless.

                              I’ll cross that bridge when it actually happens.

                              K 1 Reply Last reply
                              2
                              • S sirblastalot@ttrpg.network

                                Basically what diceware does. It’s just that humans are really bad at picking random words (“banana” is over represented, for instance) that’s what diceware helps with.

                                G This user is from outside of this forum
                                G This user is from outside of this forum
                                graybackgroundmusic@lemmy.zip
                                wrote last edited by
                                #29

                                I look around the room or think about what I’m doing. My username was made that way.

                                S 1 Reply Last reply
                                0
                                • G graybackgroundmusic@lemmy.zip

                                  until quantum computers render all traditional cryptography meaningless.

                                  I’ll cross that bridge when it actually happens.

                                  K This user is from outside of this forum
                                  K This user is from outside of this forum
                                  kieron115@startrek.website
                                  wrote last edited by kieron115@startrek.website
                                  #30

                                  You’ve got an estimated 10 years or so before quantum computers can crack all current encryption by using Shor’s algorithm.

                                  One of the most important quantum computing algorithms, known as Shor’s algorithm, would allow a large-scale quantum computer to quickly break essentially all of the encryption systems that are currently used to secure internet traffic against interception. Today’s quantum computers are nowhere near large enough to execute Shor’s algorithm in a practical setting, and the expert consensus is that these cryptanalytically relevant quantum computers (CRQCs) will not be developed until at least the 2030s.

                                  1 Reply Last reply
                                  0
                                  • G graybackgroundmusic@lemmy.zip

                                    I look around the room or think about what I’m doing. My username was made that way.

                                    S This user is from outside of this forum
                                    S This user is from outside of this forum
                                    sirblastalot@ttrpg.network
                                    wrote last edited by
                                    #31

                                    Not recommended. People can and do crib the kinds of things you’re likely to have around you. It can narrow the field of guesses more than you’d think.

                                    1 Reply Last reply
                                    0
                                    • nocturne@slrpnk.netN nocturne@slrpnk.net

                                      And your memory is not a single point of failure?

                                      S This user is from outside of this forum
                                      S This user is from outside of this forum
                                      sirblastalot@ttrpg.network
                                      wrote last edited by sirblastalot@ttrpg.network
                                      #32

                                      Well, no, not really. If I forget a password I’ve only lost access to the one site, and it’s recoverable. Just an partial failure. Not going to lose everything unless I literally die in which case I don’t care about anything anymore. And no one is going to breach my brain short of tying me to a chair, and that’s not really my threat model.

                                      nocturne@slrpnk.netN 1 Reply Last reply
                                      0
                                      • S sirblastalot@ttrpg.network

                                        Well, no, not really. If I forget a password I’ve only lost access to the one site, and it’s recoverable. Just an partial failure. Not going to lose everything unless I literally die in which case I don’t care about anything anymore. And no one is going to breach my brain short of tying me to a chair, and that’s not really my threat model.

                                        nocturne@slrpnk.netN This user is from outside of this forum
                                        nocturne@slrpnk.netN This user is from outside of this forum
                                        nocturne@slrpnk.net
                                        wrote last edited by
                                        #33

                                        Gotcha, the boomer method. 👍

                                        1 Reply Last reply
                                        0
                                        • S sirblastalot@ttrpg.network

                                          Password managers are OK but I have hesitations on them personally. I’m leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you’re not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I’m not advocating for any particular method, just putting it out there so people can make an informed decision.

                                          I This user is from outside of this forum
                                          I This user is from outside of this forum
                                          implosive_sprig@beehaw.org
                                          wrote last edited by
                                          #34

                                          I use horse-battery-staple passwords for core stuff (unlocking my computer, bank stuff).

                                          I use the password manager-generated passwords for everything that’s in a browser.

                                          1 Reply Last reply
                                          0

                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post