303
you are viewing a single comment's thread
view the rest of the comments
[-] Something_Complex@lemmy.world 13 points 1 year ago

Idk exactly how accurate this is but seems valid

[-] atkion@sh.itjust.works 9 points 1 year ago

The colors on that are kinda confusing. 6tn years is yellow, but 2k years is green?

[-] SnipingNinja@slrpnk.net 4 points 1 year ago

It seems like the designer didn't notice the error

[-] bnfdhfdhfd@lemmy.world 5 points 1 year ago* (last edited 1 year ago)

So those annoying as hell "6 character, lowercase and uppercase letters, special character" passwords give a full 6 minutes of protection. Good to know.

[-] ngcbassman@sh.itjust.works 2 points 1 year ago

For 6 characters is 5 seconds. I like the idea of using passphrases that mix casing with symbols but still they look like like real words, it make easier to write them down when you need them and they can be very long, so they are quite secure, of course using a password manager to be able to manage them.

[-] bnfdhfdhfd@lemmy.world 1 points 1 year ago

Damn, even worse than I thought. I wish someone would show this to the people who set those ridiculous password requirements.

I was glad when my work did away with monthly password changes and went with 15 characters minimum as the only requirement.

[-] dbilitated@aussie.zone 3 points 1 year ago

I wonder if this assumes the cracker knows how long etc the password is when they start cracking.

I always make my passwords "a" because I figure they'll start cracking attempts at 5 characters ๐Ÿ˜

[-] fosstulate@iusearchlinux.fyi 2 points 1 year ago

In EVE Online that's called 'getting underneath the guns'. ๐ŸŽ“

[-] echodot@feddit.uk 1 points 1 year ago* (last edited 1 year ago)

Why is 1,000 years yellow in that graph?

If a password can't be broke in 1,000 years it is utterly unbreakable in any effective sense of the term. No one's going to run the program for a thousand years because even if they did it wouldn't be relevant at the end of the process.

Hell even 51 years is pushing it.

[-] The_Vampire@lemmy.world 4 points 1 year ago

Well, the rate passwords can be tested at now may not always be the rate passwords can be tested at later. Computers were, at one point, growing exponentially faster in terms of processing power. There are still several emerging technologies out there that could cause significant speed-ups.

It's certainly better to future-proof your passwords.

this post was submitted on 03 Nov 2023
303 points (87.0% liked)

Technology

59861 readers
3735 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS