Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse

Chebucto Regional Softball Club

  1. Home
  2. Uncategorized
  3. Reminder to use strong passwords
A forum for discussing and organizing recreational softball and baseball games and leagues in the greater Halifax area.

Reminder to use strong passwords

Scheduled Pinned Locked Moved Uncategorized
rpgmemes
39 Posts 21 Posters 193 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S sirblastalot@ttrpg.network
    Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don't already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn't actually do. I recommend [Diceware](https://theworld.com/~reinhold/diceware.html) I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!
    ? Offline
    ? Offline
    Guest
    wrote last edited by
    #21
    Horse: "That's a battery staple." Man: "Correct!"
    1 Reply Last reply
    1
    0
    • ? Guest
      I like the CorrectHorseBatteryStaple methodology. https://xkcd.com/936 !https://imgs.xkcd.com/comics/password_strength.png
      ? Offline
      ? Offline
      Guest
      wrote last edited by
      #22
      these are called pass *phrases* and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.
      ? ? 2 Replies Last reply
      1
      0
      • S sirblastalot@ttrpg.network
        Password managers are OK but I have hesitations on them personally. I'm leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you're not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I'm not advocating for any particular method, just putting it out there so people can make an informed decision.
        Q This user is from outside of this forum
        Q This user is from outside of this forum
        quetzalcutlass@lemmy.world
        wrote last edited by
        #23
        > I'm leery of putting all my most high-value stuff in one place behind one password. Most password managers can be set up to also require a keyfile and/or physical passkey to unlock their databases. A keyfile means someone couldn't get into your password database even if it got leaked and they knew the password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself), while a physical passkey makes it virtually impossible to breach the database unless someone steals the USB device.
        S 1 Reply Last reply
        1
        0
        • S sirblastalot@ttrpg.network
          Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don't already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn't actually do. I recommend [Diceware](https://theworld.com/~reinhold/diceware.html) I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!
          Aielman15A This user is from outside of this forum
          Aielman15A This user is from outside of this forum
          Aielman15
          wrote last edited by
          #24
          Over the years, nobody has ever guessed my passwords, but four sites I was subscribed to were compromised and my email+password got leaked anyway. The strongest chain and the weakest link...
          1 Reply Last reply
          1
          0
          • Q quetzalcutlass@lemmy.world
            > I'm leery of putting all my most high-value stuff in one place behind one password. Most password managers can be set up to also require a keyfile and/or physical passkey to unlock their databases. A keyfile means someone couldn't get into your password database even if it got leaked and they knew the password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself), while a physical passkey makes it virtually impossible to breach the database unless someone steals the USB device.
            S This user is from outside of this forum
            S This user is from outside of this forum
            sirblastalot@ttrpg.network
            wrote last edited by
            #25
            I guess what I mean is, it's a single point of failure. Usually an extremely strong one, granted.
            ? 1 Reply Last reply
            1
            0
            • ? Guest
              these are called pass *phrases* and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.
              ? Offline
              ? Offline
              Guest
              wrote last edited by
              #26
              Well good news then, because even throwing every quantum computer currently on the planet is not enough to factor 2048-bit RSA, and likely won't be in any currently alive human's lifetime.
              ? 1 Reply Last reply
              0
              • ? Guest
                Well good news then, because even throwing every quantum computer currently on the planet is not enough to factor 2048-bit RSA, and likely won't be in any currently alive human's lifetime.
                ? Offline
                ? Offline
                Guest
                wrote last edited by
                #27
                Maybe with *current* quantum computers, but human technology tends to increase at an exponential rate so I doubt it will be long. Scientists are already trying to design post-quantum encryption for this very reason. https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
                1 Reply Last reply
                0
                • S sirblastalot@ttrpg.network
                  I guess what I mean is, it's a single point of failure. Usually an extremely strong one, granted.
                  ? Offline
                  ? Offline
                  Guest
                  wrote last edited by
                  #28
                  And your memory is not a single point of failure?
                  S 1 Reply Last reply
                  0
                  • ? Guest
                    these are called pass *phrases* and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.
                    ? Offline
                    ? Offline
                    Guest
                    wrote last edited by
                    #29
                    > until quantum computers render all traditional cryptography meaningless. I'll cross that bridge when it actually happens.
                    ? 1 Reply Last reply
                    0
                    • S sirblastalot@ttrpg.network
                      Basically what diceware does. It's just that humans are really bad at picking random words ("banana" is over represented, for instance) that's what diceware helps with.
                      ? Offline
                      ? Offline
                      Guest
                      wrote last edited by
                      #30
                      I look around the room or think about what I'm doing. My username was made that way.
                      S 1 Reply Last reply
                      0
                      • ? Guest
                        > until quantum computers render all traditional cryptography meaningless. I'll cross that bridge when it actually happens.
                        ? Offline
                        ? Offline
                        Guest
                        wrote last edited by
                        #31
                        You’ve got an estimated 5-10 years before quantum computers can crack all current encryption by using Shor’s algorithm. > One of the most important quantum computing algorithms, known as Shor's algorithm, would allow a large-scale quantum computer to quickly break essentially all of the encryption systems that are currently used to secure internet traffic against interception. Today's quantum computers are nowhere near large enough to execute Shor's algorithm in a practical setting, and the expert consensus is that these cryptanalytically relevant quantum computers (CRQCs) will not be developed until at least the 2030s.
                        1 Reply Last reply
                        1
                        0
                        • ? Guest
                          I look around the room or think about what I'm doing. My username was made that way.
                          S This user is from outside of this forum
                          S This user is from outside of this forum
                          sirblastalot@ttrpg.network
                          wrote last edited by
                          #32
                          Not recommended. People can and do crib the kinds of things you're likely to have around you. It can narrow the field of guesses more than you'd think.
                          1 Reply Last reply
                          1
                          0
                          • ? Guest
                            And your memory is not a single point of failure?
                            S This user is from outside of this forum
                            S This user is from outside of this forum
                            sirblastalot@ttrpg.network
                            wrote last edited by
                            #33
                            Well, no, not really. If I forget a password I've only lost access to the one site, and it's recoverable. Just an incremental failure. Not going to lose everything unless I literally die in which case I don't care about anything anymore. And no one is going to breach my brain short of tying me to a chair, and that's not really my threat model.
                            ? 1 Reply Last reply
                            1
                            0
                            • S sirblastalot@ttrpg.network
                              Well, no, not really. If I forget a password I've only lost access to the one site, and it's recoverable. Just an incremental failure. Not going to lose everything unless I literally die in which case I don't care about anything anymore. And no one is going to breach my brain short of tying me to a chair, and that's not really my threat model.
                              ? Offline
                              ? Offline
                              Guest
                              wrote last edited by
                              #34
                              Gotcha, the boomer method. 👍
                              1 Reply Last reply
                              0
                              • S sirblastalot@ttrpg.network
                                Password managers are OK but I have hesitations on them personally. I'm leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you're not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I'm not advocating for any particular method, just putting it out there so people can make an informed decision.
                                ? Offline
                                ? Offline
                                Guest
                                wrote last edited by
                                #35
                                I use horse-battery-staple passwords for core stuff (unlocking my computer, bank stuff). I use the password manager-generated passwords for everything that's in a browser.
                                1 Reply Last reply
                                1
                                0
                                • ? Guest
                                  'Pass word1! Oh, ' and spaces aren't allowed?
                                  festnt@sh.itjust.worksF This user is from outside of this forum
                                  festnt@sh.itjust.worksF This user is from outside of this forum
                                  festnt@sh.itjust.works
                                  wrote last edited by
                                  #36
                                  we want you to have a secure password so we're only letting you use letters, numbers, and !@#$. nothing else. also, you have to use at least one of each, and it can only be 8 to 12 characters long. remember, we're doing this for your security!
                                  1 Reply Last reply
                                  0
                                  • A archpawn@lemmy.world
                                    Ideally all lowercase letters to make them easy to type when you need to use them in another device. Unfortunately, a lot of places don't allow that, preferring less secure and more inconvenient passwords.
                                    festnt@sh.itjust.worksF This user is from outside of this forum
                                    festnt@sh.itjust.worksF This user is from outside of this forum
                                    festnt@sh.itjust.works
                                    wrote last edited by
                                    #37
                                    30 characters? you don't need that, we only let you use up to 10. also yes you have to have at least one lowercase letter, uppercase letter, number and a symbol (which can only be !, @, #, or $). we're doing this for your security, of course
                                    1 Reply Last reply
                                    0
                                    • S sirblastalot@ttrpg.network
                                      Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don't already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn't actually do. I recommend [Diceware](https://theworld.com/~reinhold/diceware.html) I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!
                                      ? Offline
                                      ? Offline
                                      Guest
                                      wrote last edited by
                                      #38
                                      @sirblastalot@ttrpg.network It seems that my (current) main account was banned as part of that cleaning. Can you or another moderator let me know what's the process of appealing this ban ? Or shall I take-it as an opportunity to move my main account to piefed ?
                                      S 1 Reply Last reply
                                      0
                                      • ? Guest
                                        @sirblastalot@ttrpg.network It seems that my (current) main account was banned as part of that cleaning. Can you or another moderator let me know what's the process of appealing this ban ? Or shall I take-it as an opportunity to move my main account to piefed ?
                                        S This user is from outside of this forum
                                        S This user is from outside of this forum
                                        sirblastalot@ttrpg.network
                                        wrote last edited by
                                        #39
                                        DMing you
                                        1 Reply Last reply
                                        0

                                        Reply
                                        • Reply as topic
                                        Log in to reply
                                        • Oldest to Newest
                                        • Newest to Oldest
                                        • Most Votes


                                        • 1
                                        • 2
                                        • Login

                                        • Don't have an account? Register

                                        • Login or register to search.
                                        Powered by NodeBB Contributors
                                        • First post
                                          Last post
                                        0
                                        • Categories
                                        • Recent
                                        • Tags
                                        • Popular
                                        • World
                                        • Users
                                        • Groups