As I explained to the other one, no dictionary attack will happen upon that exact combination of words any faster than the keyboard mashing preceding it.
Using a COMMON word or a COMMON phrase would leave you vulnerable, sure, but no prediction process is going to happen on the exact combination.
Hell, add a word or two to “SaltyIceteaMaker” and it would make an extremely secure pass phrase. For something without that string in the user id, of course 😁
The main advantage of a password manager is that you can have a different password for each account. Which means in case of a leak you won’t be in risk of losing other accounts.
And I don’t think I want to remember 300 pass phrases with different words.
The main advantage of a password manager is that you can have a different password for each account. Which means in case of a leak you won’t be in risk of losing other accounts
Except it’s the opposite: if someone gets the master password for your password manager, that’s all of them.
And I don’t think I want to remember 300 pass phrases with different words.
That’s another advantage of the pass phrase over the easily remembered password: repeating an uncrackable passphrase doesn’t pose the risk that repeating a guessable password.
You can use RentMauriceHouseHurryNow for all your accounts and they’ll all be safer than a billion different strings protected by a single guessable master password.
Especially if you’re not in the tiny minority of people who actually knows a Maurice who isn’t called The Space Cowboy by some people.
You now quickly try to change the password on 15 accounts with the same email and password. But you forgot the 5 accounts you made years ago. Now after some time hackers login into the the old accounts and get your credit card info or whatever.
Great idea!
Yes my password manager is a single point of failure, but it is one I personally control and have the view over.
A series of pass phrases that you can remember yourself is still better than relying on a password manager that can ALSO expose all of your passwords, none of which you remember.
It’s still less combinations than just scramble tho. It may be enough idk, but an algorithm that just combines words would definitely at some point arrive at like “SaltyIceteaMakerBlueAcorn” it’s only once you add random letters/numbers/special characters that a dictionary attack stops working.
Although this probably doesn’t matter as it would likely still take like a century or ten to complete
It’s still less combinations than just scramble tho
Not in any meaningful way, no. There’s what, hundreds of thousands of words in the English language? With no apparent pattern, that’s a near-infinite number of possible combinations of 5 or 6 word phrases.
Add that most password crackers would use another kind of attack that presupposes that there’s numbers and special characters and you really have redundancy on redundancy.
an algorithm that just combines words would definitely at some point arrive at like “SaltyIceteaMakerBlueAcorn”
Not within your lifespan or even that of humanity.
it’s only once you add random letters/numbers/special characters that a dictionary attack stops working.
That’s just not true if you don’t consider “might theoretically get there in a million years” as “working”.
Although this probably doesn’t matter as it would likely still take like a century or ten to complete
Exactly. So your entire point is moot. A password or passphrase doesn’t need to hold for longer than the existence of the account (or whatever’s being protected by it), the user, or the species of the user.
Until you get hit with a dictionary attack.
Luckily this isn’t really viable today as most logins just block you after like 5 attempts.
only sucks when you have 6 passwords and don’t remember which oneAs I explained to the other one, no dictionary attack will happen upon that exact combination of words any faster than the keyboard mashing preceding it.
Using a COMMON word or a COMMON phrase would leave you vulnerable, sure, but no prediction process is going to happen on the exact combination.
Hell, add a word or two to “SaltyIceteaMaker” and it would make an extremely secure pass phrase. For something without that string in the user id, of course 😁
The main advantage of a password manager is that you can have a different password for each account. Which means in case of a leak you won’t be in risk of losing other accounts.
And I don’t think I want to remember 300 pass phrases with different words.
Except it’s the opposite: if someone gets the master password for your password manager, that’s all of them.
That’s another advantage of the pass phrase over the easily remembered password: repeating an uncrackable passphrase doesn’t pose the risk that repeating a guessable password.You can use RentMauriceHouseHurryNow for all your accounts and they’ll all be safer than a billion different strings protected by a single guessable master password.Especially if you’re not in the tiny minority of people who actually knows a Maurice who isn’t called The Space Cowboy by some people.
Using the same password (no matter how secure it is) for all accounts is a bad idea.
Assuming you have at least 20 accounts with sensible data, and you don’t even remember that 5 of them exist.
Now shittywebsite.xy gets hacked and all data is unencrypted and unhashed.
So now your.email@adress.com with yourSecu4ePassPhrase is leaked.
You now quickly try to change the password on 15 accounts with the same email and password. But you forgot the 5 accounts you made years ago. Now after some time hackers login into the the old accounts and get your credit card info or whatever.
Great idea!
Yes my password manager is a single point of failure, but it is one I personally control and have the view over.
Good point.
A series of pass phrases that you can remember yourself is still better than relying on a password manager that can ALSO expose all of your passwords, none of which you remember.
It’s still less combinations than just scramble tho. It may be enough idk, but an algorithm that just combines words would definitely at some point arrive at like “SaltyIceteaMakerBlueAcorn” it’s only once you add random letters/numbers/special characters that a dictionary attack stops working.
Although this probably doesn’t matter as it would likely still take like a century or ten to complete
Not in any meaningful way, no. There’s what, hundreds of thousands of words in the English language? With no apparent pattern, that’s a near-infinite number of possible combinations of 5 or 6 word phrases.
Add that most password crackers would use another kind of attack that presupposes that there’s numbers and special characters and you really have redundancy on redundancy.
Not within your lifespan or even that of humanity.
That’s just not true if you don’t consider “might theoretically get there in a million years” as “working”.
Exactly. So your entire point is moot. A password or passphrase doesn’t need to hold for longer than the existence of the account (or whatever’s being protected by it), the user, or the species of the user.
Chill bro it was just me rambling about and even arguing against myself. Didn’t have to make a whole callout post lol
I was just answering your arguments and didn’t want to let all of that mental work go to waste when I saw the reveal at the very bottom 😄