this post was submitted on 05 Jul 2023
42 points (97.7% liked)

Asklemmy

43892 readers
1075 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy πŸ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
 

I was gonna ask about the biometrics part in a separate question, but its both about security, so might as well combine it in one post.

Okay so I don't use password managers. I just try to make easy to remember passwords 3-4 random words + 3-4 random numbers. ~~Online accounts can't be brute forced anyways.~~ Edit: I mean most websites have log in limits don't they? Maybe I've been mistaken?

For offline accounts, I just increase the words and numbers. For mobile I don't use biometrics, although I've been testing whether or not I want a pin + no biometrics or alphanumeric password + biometrics. I just can't decide.

you are viewing a single comment's thread
view the rest of the comments
[–] megsmagik@feddit.it 1 points 1 year ago (1 children)

I use Bitwarden and I have 2FA where it’s implemented. Why do you say that online accounts cannot be brute forced?

[–] 001100010010@lemmy.dbzer0.com 2 points 1 year ago (3 children)

Most online logins have limits. You can't just try a million passwords in a second.

[–] zerbey@lemmy.world 3 points 1 year ago* (last edited 1 year ago)

This is true, but if their password database gets compromised and they're using insecure storage then they can brute force all day. There are server farms dedicated to doing just that and the vast majority of users are using simple, easy to guess passwords. The most common password? "password" [source: https://nordpass.com/most-common-passwords-list/]. Yes, we are a stupid species.

[–] EyesEyesBaby@lemmy.world 3 points 1 year ago* (last edited 1 year ago)

In theory that is correct. In practice, not always the case. Up until 8 years ago you could brute force iCloud passwords: https://www.intego.com/mac-security-blog/apple-patches-brute-force-password-cracking-security-hole-in-icloud

[–] rambles_shuck@lemm.ee 3 points 1 year ago (1 children)

Nobody will try to brute force your account on a login form unless you are a high value target. Databases get leaked and password hashes with them. There are tools like haveibeenpwned which check your email against known database dumps that are available to everyone on the dark web.

[–] megsmagik@feddit.it 2 points 1 year ago

I’m subscribed to haveibeenpwned but sometimes I read of breaches where password were plain text… a password manager is the best option, some of them also alert you of known breaches so you can change your password instantly