 |
By (user no longer on site) OP
over a year ago
|
Following from a previous thread, thought I would remind people about password safety.
Passwords used to be guessed, literally, and a more complicated password makes it harder to guess. This is easily demonstrated as follows. Imagine your password has to be a combination of upper case, lowercase, numbers and special characters (!@£$ etc).
1) A password that is 1 character long is a 1 in 82 chance to guess
2) A password that is 2 characters long is a 1 in 6724 chance to guess...
3) A password that is 8 characters long is a 1 in 2044140858654976!
Seems like a lot, but a computer can guess that 8 character password in about 8 hours. But the thing is, they already guessed it, and stored those guesses in a massive file. And so now, instead of guessing your password, they steal all the passwords in their encrypted format by hacking your apps and websites, and just look it up against a pre-cracked list. Takes seconds, if they can get hold of your encrypted password. And password breaches happen all the time.
Case in point: My Fitness Pal
Date: February 2018
Impact: 150 million user accounts
In February 2018, diet and exercise app MyFitnessPal (owned by Under Armour) exposed around 150 million unique email addresses, IP addresses and login credentials such as usernames and passwords stored as SHA-1 and bcrypt hashes. The following year, the data appeared for sale on the dark web and more broadly.
The bad news: I bet you already have had your password breached by someone. Go check, if you are on iPhone, go into SettingsPasswordsSecurity RecommendationsDetect compromised passwords. Yeah, Apple buy these lists too, and use them to inform you you are on them. Be horrified how many places have lost your data. On my list, Google, my daughters school, Cineworld....
The good news: When they have 150million accounts to look at, they will basically use other pre-prepared lists of people of influence, rich people, famous people, important people...and you will probably get overlooked..hopefully.
What you can do:
Well, creating, and storing these frankly mind boggling enormous lists of password cracks is expensive, and the longer your password is, the harder it is for someone to crack it in advance and the more data they need to pay Amazon or Microsoft to store it. So just make them so long that they can't afford to do it (yet). But long passwords are hard to remember, so you're stuck between a rock and a hard place, right?
Wrong, because the game has changed from guessing, to stealing it and comparing it, the ONLY thing that matters is length (phnarr)
Th1$is4HARDp4$$w)rd - seems great, and it is very hard to crack, and sufficiently long that not many criminal gangs can pay for the compute and storage to hold it, but you know what's better?
MargaretThatcheris100%sexy - it's slightly longer, and so easy to remember you will never need to write it down. Plus it's approximately 6723 times harder to crack than the one above...
a list of 9 character long passwords increase the 8 hours to 3 weeks. Up to 10 characters and its 5 years. 11 characters, 400 years.... Remember these times come down every week, but if you are using a 15 character password, that's currently 15billion years of computer to guess them all....
TLDR:
Use LONG passwords of at LEAST 12 characters that are EASY to remember, forget about complex character substitution.
Never re-use them |