A forum for discussing and organizing recreational softball and baseball games and leagues in the greater Halifax area.
Reminder to use strong passwords
-
Just make one super strong password, use that to unlock you password manager and have it generate 30 character passwords for everything.Ideally all lowercase letters to make them easy to type when you need to use them in another device. Unfortunately, a lot of places don't allow that, preferring less secure and more inconvenient passwords.
-
Random passwords are good practice, what isn’t good practice is following _specific password requirements_ like 10 characters 1 uppercase, 1 symbol because that _reduces your search space_. A 30 or 50 character password generated by your password manager is _always_ the most secure option, the longer the better. I generate passwords that go to the maximum the service allows.
-
Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don't already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn't actually do. I recommend [Diceware](https://theworld.com/~reinhold/diceware.html) I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!
-
This is what you get for making me admin, I've gone mad with power, muhahahahaha! crimes o-o
-
Just make one super strong password, use that to unlock you password manager and have it generate 30 character passwords for everything.Password managers are OK but I have hesitations on them personally. I'm leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you're not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I'm not advocating for any particular method, just putting it out there so people can make an informed decision.
-
Diceware is a method of generating random memorable passwords.
-
I like the CorrectHorseBatteryStaple methodology. https://xkcd.com/936 !https://imgs.xkcd.com/comics/password_strength.pngBasically what diceware does. It's just that humans are really bad at picking random words ("banana" is over represented, for instance) that's what diceware helps with.
-
Diceware is a method of generating random memorable passwords.
-
Basically what diceware does. It's just that humans are really bad at picking random words ("banana" is over represented, for instance) that's what diceware helps with.I used to use words from different vernaculars or languages. Sometimes i double check they are too abstract and weird to correct horse battery staple easily just because I'm a contrarian asshole snd thst helps me remember. exquisitevibrattoacquittalbevelschaudenfreude
-
Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don't already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn't actually do. I recommend [Diceware](https://theworld.com/~reinhold/diceware.html) I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!
-
I like the CorrectHorseBatteryStaple methodology. https://xkcd.com/936 !https://imgs.xkcd.com/comics/password_strength.png
-
Password managers are OK but I have hesitations on them personally. I'm leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you're not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I'm not advocating for any particular method, just putting it out there so people can make an informed decision.> I'm leery of putting all my most high-value stuff in one place behind one password. Most password managers can be set up to also require a keyfile and/or physical passkey to unlock their databases. A keyfile means someone couldn't get into your password database even if it got leaked and they knew the password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself), while a physical passkey makes it virtually impossible to breach the database unless someone steals the USB device.
-
Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don't already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn't actually do. I recommend [Diceware](https://theworld.com/~reinhold/diceware.html) I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!Over the years, nobody has ever guessed my passwords, but four sites I was subscribed to were compromised and my email+password got leaked anyway. The strongest chain and the weakest link...
-
> I'm leery of putting all my most high-value stuff in one place behind one password. Most password managers can be set up to also require a keyfile and/or physical passkey to unlock their databases. A keyfile means someone couldn't get into your password database even if it got leaked and they knew the password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself), while a physical passkey makes it virtually impossible to breach the database unless someone steals the USB device.I guess what I mean is, it's a single point of failure. Usually an extremely strong one, granted.
-
these are called pass *phrases* and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.
-
Well good news then, because even throwing every quantum computer currently on the planet is not enough to factor 2048-bit RSA, and likely won't be in any currently alive human's lifetime.Maybe with *current* quantum computers, but human technology tends to increase at an exponential rate so I doubt it will be long. Scientists are already trying to design post-quantum encryption for this very reason. https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
-
I guess what I mean is, it's a single point of failure. Usually an extremely strong one, granted.
-
these are called pass *phrases* and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.
-
Basically what diceware does. It's just that humans are really bad at picking random words ("banana" is over represented, for instance) that's what diceware helps with.

️