this post was submitted on 05 Jul 2023
1522 points (98.5% liked)

Android

27941 readers
115 users here now

DROID DOES

Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules


1. All posts must be relevant to Android devices/operating system.


2. Posts cannot be illegal or NSFW material.


3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.


4. Non-whitelisted bots will be banned.


5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.


6. Memes are not allowed to be posts, but are allowed in the comments.


7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.


8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.


Community Resources:


We are Android girls*,

In our Lemmy.world.

The back is plastic,

It's fantastic.

*Well, not just girls: people of all gender identities are welcomed here.


Our Partner Communities:

!android@lemmy.ml


founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Monologue@lemmy.zip 67 points 1 year ago (3 children)

yup randomly generated 20+ digit passwords are the way to go

[–] Zectivi@lemmy.world 93 points 1 year ago* (last edited 1 year ago) (5 children)

Same, just gotta watch out for sites that don't support it and don't tell you that they don't. I got into a password reset loop with a site once, until I realized it was truncating my 20 character password to their supported max of 16. They never said the max was 16, and never game an error that 20 wasn't allowed. Just simply an asshole design. I probably could check bitwarden for whatever password I changed the most and see if it's still an issue with the site.

[–] butternuts@lemmy.world 33 points 1 year ago

I consider this lazy programming. I've had it happen a few times but luckily it has been rare for me.

[–] actually_a_tomato@lemm.ee 13 points 1 year ago

That sounds infuriating

[–] AbidanYre@lemmy.world 7 points 1 year ago

Reddit used to do that but silently truncated at 20.

[–] Sterben@lemmy.world 2 points 1 year ago

I usually generate 16 characters password for this reason.

[–] narshok@lemmy.world 3 points 1 year ago (3 children)

Is there a legitimate reason to use 20 characters over 16? Genuinely asking. Bitwarden considers them both "strong", taking centuries to crack.

[–] Siors@lemmy.world 10 points 1 year ago (1 children)

Well the more characters you have the higher the entropy of the password and the harder it would be to crack. So when you don't have to remember the password yourself there's no reason not to use a very long password if the service you're using allows it.

[–] Coreidan@lemmy.world 10 points 1 year ago (1 children)

Except no one cracks passwords. Vast majority of hacks is through social networking and trojans. The days of password cracking are long over especially considering most services lock you out after several failed attempts.

The main argument for using a password manager is so you can have a different password for every service. This way if they manage to obtain one password they can’t access everything.

It also makes rotating passwords a lot easier so that way you’re not using the same password forever. If your password gets out hopefully it’s changed before they use it.

[–] lemmyvore@feddit.nl 3 points 1 year ago

Offline password cracking is still very much a thing. They steal the entire password database then crack it offline at their leisure, not live against the regular login.

Several measures are required to defend against this:

  • Hash seeds defend against rainbow tables.
  • Password length & complexity as well as using computationally-intensive hash algorithms defend against the brute-force cracking.
  • Password managers help with length and complexity, sad well as promote not reusing passwords.
[–] Bazoogle@lemmy.world 5 points 1 year ago (1 children)

There's realistically no reason not to generate the max password. The different in possibilities between a password with 16 characters and one with 20 (using a-zA-Z0-9!@#$%^&*()?-+." which isn't even all the options) is 1.2E30 v s 4.13E37. That's seven orders of magnitude from 4 characters. The difference between $1 and $10,000,000. But to be fair, 1.2E30 possible combinations is kind of a lot already, but why not add a few more characters just for the hell of it?

[–] StudioLE@programming.dev -1 points 1 year ago (1 children)

If you always use the maximum then the length of your password becomes predictable which reduces the number of permutations.

It's probably better to use a password of around 60-100% of the maximum

[–] Bazoogle@lemmy.world 3 points 1 year ago

I mean, that's true. And that's usually the case since I typically use a slider. But if you password is 100 characters, numbers, and symbols, I don't think telling them the exact length is going to help much.

[–] Monologue@lemmy.zip 4 points 1 year ago

i mean i got the option and i don't need to actually remember it so why not?

[–] nocturne213@lemmy.world 2 points 1 year ago (1 children)

When possible I use passphrases with numbers added. Sadly my bank has a 16 character limit.

[–] zdrvr@lemm.ee 11 points 1 year ago (1 children)
[–] jasonwaterfalls@lemmy.world 3 points 1 year ago (1 children)

Why? Do you know how long it takes to crack a 16 character password?

[–] Coreidan@lemmy.world 1 points 1 year ago (1 children)

Password cracking isn’t really a thing anymore.

[–] jasonwaterfalls@lemmy.world 1 points 1 year ago (1 children)

You're telling me nobody uses brute force attacks anymore?

[–] Coreidan@lemmy.world -3 points 1 year ago

Nope. Most services lock you out after 3 failed password attempts for 10-15 minutes. Password cracking would take centuries at that rate.

It worked in the 90s when you could pound the severs for hours/days before even being noticed. Now you’ll just get auto IP banned.