Page 4 of 5 FirstFirst ... 2 3 4 5 LastLast
Results 31 to 40 of 45
  1. #31
    Player
    JackHatchet's Avatar
    Join Date
    Aug 2013
    Posts
    527
    Character
    Naus Prime
    World
    Mateus
    Main Class
    Bard Lv 90
    What if it was like some third party fan-site? Couldn't they set up their website to save and view passwords that users submit?
    (0)

  2. #32
    Player
    Tridus's Avatar
    Join Date
    Jun 2017
    Location
    The Goblet
    Posts
    1,510
    Character
    Cecelia Stormfeather
    World
    Cactuar
    Main Class
    White Mage Lv 90
    Quote Originally Posted by JackHatchet View Post
    What if it was like some third party fan-site? Couldn't they set up their website to save and view passwords that users submit?
    They could. I mean, technically a major company like Blizzard could too. But they wouldn't because it's grossly illegal and as a business a really poor idea.

    Some random website can absolutely do it. Which is another reason why password reuse is bad.
    (1)
    Survivor of Housing Savage 2018.
    Discord: Tridus#2642

  3. #33
    Player NephthysVasudan's Avatar
    Join Date
    Sep 2017
    Location
    Ul'Dah
    Posts
    1,091
    Character
    Nephthys Yamada
    World
    Adamantoise
    Main Class
    White Mage Lv 80
    Quote Originally Posted by JackHatchet View Post
    What if it was like some third party fan-site? Couldn't they set up their website to save and view passwords that users submit?
    As an industry standard...all major companies store passwords in a hash/salt/encryption type format.
    Its considered a major violation of PII (Personally Identifiable Information) Standards and accreditation to not follow these especially if said service is handling transactions.

    Companies are not going to open themselves to lawsuits for pleasure or "gaming" to compare passwords.

    And before you ask what it is....I suggest you learn to google.
    Everything you've asked is easily found with just a bit of reading. There's no reason to derail this thread from the main point.

    I've seen your posts before..and I get the distinct distaste of troll bait every time.

    Bottom line:
    People need to take better care of their accounts to avoid loss and harm to themselves.
    (2)
    Last edited by NephthysVasudan; 05-11-2018 at 10:31 AM.

  4. #34
    Player
    KisaiTenshi's Avatar
    Join Date
    Sep 2013
    Location
    Gridania
    Posts
    2,775
    Character
    Kisa Kisa
    World
    Excalibur
    Main Class
    White Mage Lv 100
    Quote Originally Posted by Sigma-Astra View Post
    You and Mhaeric are both correct that four random words is a good strategy for a password, but it's also suggested that you should still use uppercase, lowercase, numbers, and/or symbols with the four random words.

    My fiance works in the IT field specifically, these are things that he himself suggested to me from his knowledge in the field that he's been working in for at least 10 years. I've heard horror stories of passwords he'd find for a business server that hosts all of their emails when he was called in to fix a problem with it, and their server password was "12345". I think he facepalmed so hard and immediately corrected them because that's a huge security problem for a business. xD
    The length and the type of characters are two different practices.

    If you are trying to prevent brute-force password cracking (eg a site gets hacked and their password hashes are downloaded) then all the cracker needs is time to crack a password, and in the case of Unix crypt, most systems only generate the password from the first 8 characters. So if you create a 32 character password, the hash only needs the first 8 characters, because really, the password is only the first 8 characters. So if you only have 8 characters of entropy, adding symbols, numbers and mixed-cased letters increases the entropy.

    However most websites make arbitrary requirements like upper and lower case, at least one number and symbol and in fact lower the entropy by doing so. So instead of someone having a 32 character password phrase, they are forced to remember where they put those numbers and symbols, so to make the password checker happy you put those at the beginning or end.

    Now, preventing password reuse is an easily solved problem, you keep the old hashes (but increase the data breech risk,) so the user doesn't keep switching between two favored passwords. However password-reuse between different sites is not easily solved, and in fact the bad actors made it easy to prevent these passwords from being used. https://haveibeenpwned.com/ will tell you which sites you have accounts with that have had data breeches. If a site has it's user/password hashes stolen, there is another concept called "rainbow tables" that can be used against non-salted or poorly-salted password hashes. By current estimates ANY 9 character password can be cracked in 4 days. https://www.betterbuys.com/estimatin...racking-times/ . So by current times, you only need a 12 character password, regardless of symbols, letters or numbers, it would still take 200 years to crack with a single PC. However current botnets could reduce this time significantly if an important target (eg celebrities, politicians, billionaires) is the target.



    But it also needs to be said that tools like lastpass/keeppass are solutions created because of crappy password rules enforcement, thus instead of the user creating passwords they can remember, they're forced to create passwords they will never know. It would make more sense to require users to create passwords that are minimally 12 characters in length, and to which one could easily "pad" their favorite reused password out to hit the entropy requirement (eg say your password was "ffxiv" 5 characters is way too low, you can pad it to "ilovetoplayffxiv", which is 16 characters, rather than trying to make "ffXIV14*" to meet the requirements, but the entropy is too low. That 8 character password can be cracked in 5-10 hours, over the 16 character password which would take 91 millennia.

    As an example using the Apple password manager, I created an account for my parents when they drove through a toll plaza, as we were going through it. The iphone created a password at that time and I didn't write it down. So when my dad asked for it, I was able to pull it off... the iMac. Because the passwords on the device have to be decryptable, anyone who has access to the machine can see your passwords. So if you use password managers, don't share your computer, store the encrpyted password file on a USB stick or on the cell phone memory that is only visible after being unlocked.

    The reason "cloud" password managers are bad, has more to do with relying on third parties to stay in business and not be blocked in certain countries. If you're crossing the border (eg into or out of the US as an example) you want to make sure that anyone who inspects the device can not simply turn on the WiFi and access your cloud services if you're forced to unlock it. Hence my comment about not saving banking or your email passwords on the device.
    (0)
    Last edited by KisaiTenshi; 05-11-2018 at 04:28 PM.

  5. #35
    Player
    Sigma-Astra's Avatar
    Join Date
    Mar 2017
    Location
    Ul'dah
    Posts
    1,085
    Character
    Soma Kagami
    World
    Sargatanas
    Main Class
    Black Mage Lv 90
    I'm just stating what someone working in the field actually suggests as opposed to what other people sensationalize on media and news websites. I'd trust his judgment first over what other places will naysay usually. He suggested both methods as the four random words isn't enough nowadays in terms of security.

    And really, it's a personal user error and problem if one cannot remember their own passwords. The idea is to make them harder to crack and vague to those around you, but not so impossible that you yourself can't remember it. Usually through repeated repetition of typing it in constantly, a person can remember it enough times if it's used.
    (0)

  6. #36
    Player
    Reinha's Avatar
    Join Date
    Mar 2015
    Location
    Finland
    Posts
    4,069
    Character
    Reinha Sorrowmoon
    World
    Odin
    Main Class
    Reaper Lv 100
    Quote Originally Posted by Tridus View Post
    The biggest problem with passwords (as a professional software developer) is NOT bad passwords, although those are a problem. The biggest problem is password reuse. It doesn't matter how good your password it is if you use it for both FFXIV and RandomForum.com, which got hacked last week. People use the same password for everything because humans are bad at remembering passwords and which passwords go with which sites, and that means if one site with your password on it gets hacked, ALL of your accounts are exposed.

    To that end, use a password manager. It'll create randomized passwords for every site and track them for you, so you don't have to.
    I just write every password onto a piece of paper. Can't hack a physical item, and in the unlikely event where someone breaks into your house there are more important things to lose than game and forum passwords. The one thing people should not write down anywhere is their bank login info.
    (0)
    Graphics
    MSQ
    Viper

  7. #37
    Player
    KisaiTenshi's Avatar
    Join Date
    Sep 2013
    Location
    Gridania
    Posts
    2,775
    Character
    Kisa Kisa
    World
    Excalibur
    Main Class
    White Mage Lv 100
    Quote Originally Posted by Sigma-Astra View Post
    I'm just stating what someone working in the field actually suggests as opposed to what other people sensationalize on media and news websites. I'd trust his judgment first over what other places will naysay usually. He suggested both methods as the four random words isn't enough nowadays in terms of security.

    And really, it's a personal user error and problem if one cannot remember their own passwords. The idea is to make them harder to crack and vague to those around you, but not so impossible that you yourself can't remember it. Usually through repeated repetition of typing it in constantly, a person can remember it enough times if it's used.
    When I worked for the wireless company I had to keep 14 passwords, of which half the systems had different rules, and at least two of them maxed out at 8 characters. So at the time I stored those passwords in a iPaq (greyscale compaq PDA, which is erased when the battery dies.) One of the people in my call center rigged a script to use the default assigned passwords to do something rather large scale, and my account was one of the ones that had changed the default, and was probably the only one. Most security problems come from people you know, not bogeyman on the internet.

    In a business environment, the password rules are often arbitrarily set, but then you have people just putting the passwords on sticky notes and leaving them near the PC anyway. So that defeats the entire purpose, as it's going to be the maintenance dude or the crappy coworker who wants to prank you (and yes that happens a lot. A thing that happened a lot was that if you left your PC unlocked, someone would email from your PC to your supervisor with "I'm a naughty person who leaves their computer unlocked".)
    (1)
    Last edited by KisaiTenshi; 05-11-2018 at 05:48 PM.

  8. #38
    Player
    Tridus's Avatar
    Join Date
    Jun 2017
    Location
    The Goblet
    Posts
    1,510
    Character
    Cecelia Stormfeather
    World
    Cactuar
    Main Class
    White Mage Lv 90
    Quote Originally Posted by Reinha View Post
    I just write every password onto a piece of paper. Can't hack a physical item, and in the unlikely event where someone breaks into your house there are more important things to lose than game and forum passwords. The one thing people should not write down anywhere is their bank login info.
    I have ~60 passwords at work for various things and over 200 at home, so that's not practical in all kinds of ways.

    Quote Originally Posted by KisaiTenshi View Post
    In a business environment, the password rules are often arbitrarily set, but then you have people just putting the passwords on sticky notes and leaving them near the PC anyway. So that defeats the entire purpose, as it's going to be the maintenance dude or the crappy coworker who wants to prank you (and yes that happens a lot. A thing that happened a lot was that if you left your PC unlocked, someone would email from your PC to your supervisor with "I'm a naughty person who leaves their computer unlocked".)
    Yup, although we do it by sending out emails saying "I'm bringing Tim Hortons tomorrow for everyone!"

    Very few people make that mistake twice.
    (0)
    Survivor of Housing Savage 2018.
    Discord: Tridus#2642

  9. #39
    Player
    Reinha's Avatar
    Join Date
    Mar 2015
    Location
    Finland
    Posts
    4,069
    Character
    Reinha Sorrowmoon
    World
    Odin
    Main Class
    Reaper Lv 100
    Quote Originally Posted by Tridus View Post
    I have ~60 passwords at work for various things and over 200 at home, so that's not practical in all kinds of ways.
    I have around 80 and it all fits onto one A4 sized sheet. Don't you still have to individually add every password in the password manager? The autofill option is quite practical but it seems more secure not having any passwords saved in digital form.
    (0)
    Graphics
    MSQ
    Viper

  10. #40
    Player
    Tridus's Avatar
    Join Date
    Jun 2017
    Location
    The Goblet
    Posts
    1,510
    Character
    Cecelia Stormfeather
    World
    Cactuar
    Main Class
    White Mage Lv 90
    Quote Originally Posted by Reinha View Post
    I have around 80 and it all fits onto one A4 sized sheet.
    Do you take it with you when you travel? That's not at all practical when I'm on vacation and get a call from work about a critical problem that requires one of those admin passwords, because I'm not keen on driving back home to get the password, and I'm really not keen on carrying a list of them in paper form because god help me if I misplace it. My phone at least requires a PIN to access and I can activate a remote wipe if it goes missing.

    Don't you still have to individually add every password in the password manager?
    Typically, they work by picking up when you login to a site via a browser extension, and offer to save the credentials you just used (since a browser extension can know that, which is why you shoudn't just install any random old extension). When you create an account, it offers to create the password for you and will save that. You can add stuff manually, but that's not the primary means of adding sites.

    The work one requires more manual intervention, but it's meant for a higher opsec environment and thus doesn't work the same way.

    The autofill option is quite practical but it seems more secure not having any passwords saved in digital form.
    Security is all about what it is you want to protect, how important it is, and how much effort you're willing to put into protecting it. That last part gets ignored by a lot of security advice, which is why it fails so often. Password managers make good passwords far, far easier to use by automating a lot of it and making it accessable. You take on a different risk by using one, but that risk is significantly less than doing what people usually do without one: have bad password practices.

    If writing them down works for you, great! There's no single correct answer on security questions like this, as your ability to follow the system and your comfort level matter.

    I need them on multiple devices in multiple locations, so for me that's going to be an overly difficult option to use and that'll result in problems. Thus, for me, the overall security level with Lastpass is higher than without it. A couple of critical things aren't in it (primary email for account recovery, online banking) because for those ones I don't think the gain is worth the potential risk. But my reddit password? I don't want to have to put effort into managing that, it's not important enough.

    For someone like my dad, he's bad with passwords. He'd use the same one for everything, and if he couldn't, he'd write another one down and then lose it. Gave him a password manager and once he learned how to use it, the problem went away. The result was he now has better passwords and doesn't stress about having to remember them.

    It's really all about what tradeoffs you are willing to make to get the security level you need, with a system you'll actually follow consistently. If your opsec requirements are higher than what a cloud password manager gives you, then you shouldn't use one (I know some people who use tools like Keepass for that reason instead, as it's a very high security password manager that can run in local only mode). For the average home user, that often isn't the case, and we can really boost their account security with one by having it eliminate their need to remember passwords (thus eliminating both bad passwords and password reuse on multiple sites).
    (1)
    Last edited by Tridus; 05-11-2018 at 09:59 PM.
    Survivor of Housing Savage 2018.
    Discord: Tridus#2642

Page 4 of 5 FirstFirst ... 2 3 4 5 LastLast

Tags for this Thread