Skip to content
0
  • Home
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
  • Home
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Sketchy)
  • No Skin
Collapse

Wandering Adventure Party

  1. Home
  2. RPGMemes
  3. Reminder to use strong passwords

Reminder to use strong passwords

Scheduled Pinned Locked Moved RPGMemes
rpgmemes
36 Posts 19 Posters 8 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S sirblastalot@ttrpg.network

    Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don’t already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn’t actually do.

    I recommend Diceware! I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!

    EDIT: Oh, also, all that numbers and symbols shit is no longer considered good practice. Just make it a really long collection of random words, at least 12, ideally 16+ characters. And make sure the words are actually random; your 3 favorite sports teams isn’t good enough, which is why I recommend diceware.

    T This user is from outside of this forum
    T This user is from outside of this forum
    tyler@programming.dev
    wrote last edited by
    #9

    Random passwords are good practice, what isn’t good practice is following specific password requirements like 10 characters 1 uppercase, 1 symbol because that reduces your search space. A 30 or 50 character password generated by your password manager is always the most secure option, the longer the better. I generate passwords that go to the maximum the service allows.

    kairubyte@lemmy.dbzer0.comK 1 Reply Last reply
    12
    • exuE exu

      Just make one super strong password, use that to unlock you password manager and have it generate 30 character passwords for everything.

      A This user is from outside of this forum
      A This user is from outside of this forum
      archpawn@lemmy.world
      wrote last edited by
      #10

      Ideally all lowercase letters to make them easy to type when you need to use them in another device. Unfortunately, a lot of places don’t allow that, preferring less secure and more inconvenient passwords.

      festnt@sh.itjust.worksF 1 Reply Last reply
      2
      • T tyler@programming.dev

        Random passwords are good practice, what isn’t good practice is following specific password requirements like 10 characters 1 uppercase, 1 symbol because that reduces your search space. A 30 or 50 character password generated by your password manager is always the most secure option, the longer the better. I generate passwords that go to the maximum the service allows.

        kairubyte@lemmy.dbzer0.comK This user is from outside of this forum
        kairubyte@lemmy.dbzer0.comK This user is from outside of this forum
        kairubyte@lemmy.dbzer0.com
        wrote last edited by
        #11

        “Password must be between 8 and 12 characters” 🤦🏻‍♂️

        C 1 Reply Last reply
        9
        • S sirblastalot@ttrpg.network

          Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don’t already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn’t actually do.

          I recommend Diceware! I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!

          EDIT: Oh, also, all that numbers and symbols shit is no longer considered good practice. Just make it a really long collection of random words, at least 12, ideally 16+ characters. And make sure the words are actually random; your 3 favorite sports teams isn’t good enough, which is why I recommend diceware.

          E This user is from outside of this forum
          E This user is from outside of this forum
          Elvith Ma'for
          wrote last edited by
          #12

          Also: Reminder to enable 2 factor authentication, of you haven’t.

          1 Reply Last reply
          1
          • eerongal@ttrpg.networkE eerongal@ttrpg.network

            S This user is from outside of this forum
            S This user is from outside of this forum
            sirblastalot@ttrpg.network
            wrote last edited by
            #13

            This is what you get for making me admin, I’ve gone mad with power, muhahahahaha!

            crimes o-o

            1 Reply Last reply
            7
            • exuE exu

              Just make one super strong password, use that to unlock you password manager and have it generate 30 character passwords for everything.

              S This user is from outside of this forum
              S This user is from outside of this forum
              sirblastalot@ttrpg.network
              wrote last edited by
              #14

              Password managers are OK but I have hesitations on them personally. I’m leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you’re not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I’m not advocating for any particular method, just putting it out there so people can make an informed decision.

              Q I 2 Replies Last reply
              3
              • nocturne@slrpnk.netN nocturne@slrpnk.net

                Diceware is a password locker?

                S This user is from outside of this forum
                S This user is from outside of this forum
                sirblastalot@ttrpg.network
                wrote last edited by
                #15

                Diceware is a method of generating random memorable passwords.

                nocturne@slrpnk.netN 1 Reply Last reply
                1
                • G graybackgroundmusic@lemmy.zip

                  I like the CorrectHorseBatteryStaple methodology.

                  Link Preview Image
                  Password Strength

                  favicon

                  xkcd (xkcd.com)

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  sirblastalot@ttrpg.network
                  wrote last edited by
                  #16

                  Basically what diceware does. It’s just that humans are really bad at picking random words (“banana” is over represented, for instance) that’s what diceware helps with.

                  C G 2 Replies Last reply
                  4
                  • S sirblastalot@ttrpg.network

                    Diceware is a method of generating random memorable passwords.

                    nocturne@slrpnk.netN This user is from outside of this forum
                    nocturne@slrpnk.netN This user is from outside of this forum
                    nocturne@slrpnk.net
                    wrote last edited by
                    #17

                    I would suggest a password locker rather than just a generated passphrase.

                    1 Reply Last reply
                    0
                    • kairubyte@lemmy.dbzer0.comK kairubyte@lemmy.dbzer0.com

                      “Password must be between 8 and 12 characters” 🤦🏻‍♂️

                      C This user is from outside of this forum
                      C This user is from outside of this forum
                      cassandrafatigue@lemmy.dbzer0.com
                      wrote last edited by cassandrafatigue@lemmy.dbzer0.com
                      #18

                      'Pass word1!

                      Oh, ’ and spaces aren’t allowed?

                      festnt@sh.itjust.worksF 1 Reply Last reply
                      6
                      • S sirblastalot@ttrpg.network

                        Basically what diceware does. It’s just that humans are really bad at picking random words (“banana” is over represented, for instance) that’s what diceware helps with.

                        C This user is from outside of this forum
                        C This user is from outside of this forum
                        cassandrafatigue@lemmy.dbzer0.com
                        wrote last edited by
                        #19

                        I used to use words from different vernaculars or languages. Sometimes i double check they are too abstract and weird to correct horse battery staple easily just because I’m a contrarian asshole snd thst helps me remember. exquisitevibrattoacquittalbevelschaudenfreude

                        1 Reply Last reply
                        2
                        • S sirblastalot@ttrpg.network

                          Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don’t already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn’t actually do.

                          I recommend Diceware! I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!

                          EDIT: Oh, also, all that numbers and symbols shit is no longer considered good practice. Just make it a really long collection of random words, at least 12, ideally 16+ characters. And make sure the words are actually random; your 3 favorite sports teams isn’t good enough, which is why I recommend diceware.

                          K This user is from outside of this forum
                          K This user is from outside of this forum
                          kieron115@startrek.website
                          wrote last edited by
                          #20

                          Horse: “That’s a battery staple.”

                          Man: “Correct!”

                          1 Reply Last reply
                          5
                          • G graybackgroundmusic@lemmy.zip

                            I like the CorrectHorseBatteryStaple methodology.

                            Link Preview Image
                            Password Strength

                            favicon

                            xkcd (xkcd.com)

                            K This user is from outside of this forum
                            K This user is from outside of this forum
                            kieron115@startrek.website
                            wrote last edited by
                            #21

                            these are called pass phrases and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.

                            F G 2 Replies Last reply
                            7
                            • S sirblastalot@ttrpg.network

                              Password managers are OK but I have hesitations on them personally. I’m leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you’re not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I’m not advocating for any particular method, just putting it out there so people can make an informed decision.

                              Q This user is from outside of this forum
                              Q This user is from outside of this forum
                              quetzalcutlass@lemmy.world
                              wrote last edited by quetzalcutlass@lemmy.world
                              #22

                              I’m leery of putting all my most high-value stuff in one place behind one password.

                              Password managers (at least the non-browser based ones) use methods provided by the OS to protect themselves from screen recording, direct memory reading and keyboard-sniffing. Most password managers can also be set up to require a keyfile and/or physical passkey to unlock their databases.

                              A keyfile stores data necessary for decryption separate from the password database and means someone couldn’t get into your passwords even if your database was stolen and they knew the master password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself). A keyfile also lets you keep your database on cloud storage while manually transferring the key to trusted devices, allowing cloud syncing of your passwords without fear of leaks - without the keyfile it’s all just random data.

                              A physical passkey makes it virtually impossible to breach the database unless someone steals the USB device, since it uses a challenge-response model and the data needed to spoof it should never leave the device.

                              S 1 Reply Last reply
                              4
                              • S sirblastalot@ttrpg.network

                                Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don’t already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn’t actually do.

                                I recommend Diceware! I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!

                                EDIT: Oh, also, all that numbers and symbols shit is no longer considered good practice. Just make it a really long collection of random words, at least 12, ideally 16+ characters. And make sure the words are actually random; your 3 favorite sports teams isn’t good enough, which is why I recommend diceware.

                                Aielman15A This user is from outside of this forum
                                Aielman15A This user is from outside of this forum
                                Aielman15
                                wrote last edited by aielman15@lemmy.world
                                #23

                                Over the years, nobody has ever guessed my passwords, but four sites I was subscribed to were compromised and my email+password got leaked anyway.

                                The strongest chain and the weakest link…

                                1 Reply Last reply
                                6
                                • Q quetzalcutlass@lemmy.world

                                  I’m leery of putting all my most high-value stuff in one place behind one password.

                                  Password managers (at least the non-browser based ones) use methods provided by the OS to protect themselves from screen recording, direct memory reading and keyboard-sniffing. Most password managers can also be set up to require a keyfile and/or physical passkey to unlock their databases.

                                  A keyfile stores data necessary for decryption separate from the password database and means someone couldn’t get into your passwords even if your database was stolen and they knew the master password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself). A keyfile also lets you keep your database on cloud storage while manually transferring the key to trusted devices, allowing cloud syncing of your passwords without fear of leaks - without the keyfile it’s all just random data.

                                  A physical passkey makes it virtually impossible to breach the database unless someone steals the USB device, since it uses a challenge-response model and the data needed to spoof it should never leave the device.

                                  S This user is from outside of this forum
                                  S This user is from outside of this forum
                                  sirblastalot@ttrpg.network
                                  wrote last edited by
                                  #24

                                  I guess what I mean is, it’s a single point of failure. Usually an extremely strong one, granted.

                                  nocturne@slrpnk.netN 1 Reply Last reply
                                  3
                                  • K kieron115@startrek.website

                                    these are called pass phrases and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.

                                    F This user is from outside of this forum
                                    F This user is from outside of this forum
                                    felbane@lemmy.world
                                    wrote last edited by
                                    #25

                                    Well good news then, because even throwing every quantum computer currently on the planet is not enough to factor 2048-bit RSA, and likely won’t be in any currently alive human’s lifetime.

                                    K 1 Reply Last reply
                                    0
                                    • F felbane@lemmy.world

                                      Well good news then, because even throwing every quantum computer currently on the planet is not enough to factor 2048-bit RSA, and likely won’t be in any currently alive human’s lifetime.

                                      K This user is from outside of this forum
                                      K This user is from outside of this forum
                                      kieron115@startrek.website
                                      wrote last edited by
                                      #26

                                      Maybe with current quantum computers, but human technology tends to increase at an exponential rate so I doubt it will be long. Scientists are already trying to design post-quantum encryption for this very reason.

                                      Link Preview Image
                                      NIST Releases First 3 Finalized Post-Quantum Encryption Standards

                                      NIST is encouraging computer system administrators to begin transitioning to the new standards as soon as possible

                                      favicon

                                      NIST (www.nist.gov)

                                      1 Reply Last reply
                                      1
                                      • S sirblastalot@ttrpg.network

                                        I guess what I mean is, it’s a single point of failure. Usually an extremely strong one, granted.

                                        nocturne@slrpnk.netN This user is from outside of this forum
                                        nocturne@slrpnk.netN This user is from outside of this forum
                                        nocturne@slrpnk.net
                                        wrote last edited by
                                        #27

                                        And your memory is not a single point of failure?

                                        S 1 Reply Last reply
                                        1
                                        • K kieron115@startrek.website

                                          these are called pass phrases and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.

                                          G This user is from outside of this forum
                                          G This user is from outside of this forum
                                          graybackgroundmusic@lemmy.zip
                                          wrote last edited by
                                          #28

                                          until quantum computers render all traditional cryptography meaningless.

                                          I’ll cross that bridge when it actually happens.

                                          K 1 Reply Last reply
                                          2

                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post