• Buffalox@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    edit-2
    4 days ago

    It’s actually nice they have underscore. 😀
    Yes because if you choose 8 characters at random, with 25 small + 25 big letters and 10 numeric, it* only 60^8 = 167,961,600,000,000 combinations.
    I think the problem is more if the system allows brute force with thousands of erroneous attempts.
    Then statistically any hacker can attempt several accounts, and ultimately get lucky. But by all means, put the responsibility to the user, users are the experts right!?
    I never got the frantic excessive entropy mindset, when the problem is much simpler to not allow crackers endless attempts. You can allow 50 attempts, and chances would be very slim to guess even pretty moronic passwords.

    What’s even worse is when they REQUIRE big and small and numbers to maximize entropy, they actually make statistically FEWER attempts necessary to brute force it.
    A standard Microsoft introduced in the 90’s, and FUCKING almost everybody is using, despite it’s a 100% moronic requirement.
    Instead just warn against passwords that can be guessed by logic, or can be found in a dictionary.

    • stevedice@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      11
      ·
      4 days ago

      Most websites don’t allow multiple failed logins and, even if they did, the network latency alone would make brute force attacks useless. The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes. Having different passwords for every website also protects against this so, as usual, the answer is “just use a password manager”.

      • purplemonkeymad@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 days ago

        The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes.

        I don’t think you need to worry about that in this case, the special character restriction suggests to me that they don’t hash it.

      • Buffalox@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        4
        ·
        4 days ago

        The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes.

        Seems a bit stupid if a database of passwords or other sensitive information can be brute forced.

      • Buffalox@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        4 days ago

        just use a password manager

        I will never do that, I have a system instead. I never understood why people would want to use a password manager. To me it seems it ads an attack vector, where you could lose EVERYTHING!

        • stevedice@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          ·
          4 days ago

          I guarantee your system is less secure than the worst password manager. Humans are inherently bad at choosing passwords, or anything to do with randomness really.