For example 8 lends itself to a number of words: lamin8, frustr8, abomin8, intest8, coron8, toler8.
Be careful. You don't want to use that INXS.
For example 8 lends itself to a number of words: lamin8, frustr8, abomin8, intest8, coron8, toler8.
Mellon.
Mellon.
I came here to post XKCD, but that's been done.
This is tangentially related and slightly interesting:
https://howsecureismypassword.net/
At my work I have about 75 user accounts, and I need to type the password for about ten of them several times a day. Most situations, like Windows login screens, have no access to the clipboard. It is very impractical with passwords longer than about 8 characters. The longer a password is, the greater is the possibility that there is a typing error.
I really hope that some day soon we can do away with passwords altogether. On my phone and tablet there is a workable fingerprint recognition. This can probably be fooled rather easily, but I am sure that currently this needs physical access to the unit, and apart from theft, my units seem quite safe with this system.
Or a couple of hours if someone reads that and is mates with you on facebookThe concensus here seems to be balancing the security of a password with usability - especially for naive/disinterested users for whom passwords can be painful.
With that in mind, I like the idea of one strong password to be used across all sites instead of multiple passwords. The idea is one key for everything, but a strong key. I think I can make a case for lumping the entire internet under one "seal" and essentially, one password. Just make it a good one.
I get 35 quintillion years given to crack a password that consists of my pet's name with my birthdate and elementary school name. That's the full, 21 character password. If I cut it short at ten characters (or the site limits length) the strength is given as only 8 months.
Or a couple of hours if someone reads that and is mates with you on facebook
Lol
Sent from my SM-J500Y using Tapatalk
The problem with that...With that in mind, I like the idea of one strong password to be used across all sites instead of multiple passwords. The idea is one key for everything, but a strong key.
The problem with that...
You may be dealing with multiple sites, each with different levels of security.
Lets say you use the same (unbreakable) password on your email account as on your online banking accounts. If your email account is hacked (perhaps someone finds a flaw in their security), they will then have access to your banking password too.
Now, that doesn't necessarily mean you need a unique password for EVERYTHING. But, grouping accounts makes some sense. (e.g. non-critical accounts like your password here could be reused with other on-line forums, since its not a major target for hackers.)
I agree that's a problem. I'm just pointing out a possible flaw in your solution.This is true. However, remember we are trying to strike a compromise between security and ease of use. My premise is that people pick easy, stupid passwords just because they need so many.
Depends on what accounts you share the passwords with, and if other information is included in the hack.Further, we are always vulnerable to system errors (by the website) beyond our control. How realistic is it to think, if you get my netflix username and password, you will then be able to access other accounts I have? And, what would you gain?
I agree that's a problem. I'm just pointing out a possible flaw in your solution.
Depends on what accounts you share the passwords with, and if other information is included in the hack.
Pay your netflix with a credit card or on-line banking transaction? If the netflix hack includes your banking account number (since you use it to pay for their service), then they could try using your netflix password on your banking account.
Or do you have an email contact (like gmail) attached to your netflix? They use your netflix password on your gmail account and they can access your email. Then, they can do a quick search in your mailbox for the word 'credit card'.
That's the point I want to drive home using sentences. Because it's easier to type full sentences to get long-ish passwords with less typing errors. Long passwords are prone to typing errors because you have to type "!Wt4iTf@*****".
Curious though. Do the things you describe actually happen regularly? Is it a risk inflated by theory - as in: if they steal my house key they can sneak in an attack me while I sleep - or is what you describe actually going on and how much/often?