241

Not a true greentext but I hope I have captured the spirit of it. (First time I wrote smth like this, don't be harsh on me. >w<)

all 43 comments
sorted by: hot top controversial new old
[-] RecluseRamble@lemmy.dbzer0.com 70 points 5 months ago

Use a password manager. Won't forget passwords anymore.

[-] Martineski@lemmy.dbzer0.com 52 points 5 months ago

proceeds to generate password for each service and forget the master password

[-] SkaveRat@discuss.tchncs.de 32 points 5 months ago* (last edited 5 months ago)

just use a password-manager-password password manager for the password manager password

[-] ichbinjasokreativ@lemmy.world 4 points 5 months ago

Or use a hardware key to unlock it. And then loose that hardware key. Does keepassxc support fingerprints yet?

[-] RecluseRamble@lemmy.dbzer0.com 17 points 5 months ago

Write it down somewhere. Just do it by hand.

[-] Zachariah@lemmy.world 17 points 5 months ago

Yes, and the master should be a paraphrase not a password.

[-] RecluseRamble@lemmy.dbzer0.com 8 points 5 months ago

That's just recommended to emphasize length. If your password is as long as a passphrase it's likely more secure (harder to remember though).

[-] Zachariah@lemmy.world 7 points 5 months ago

But if the point is to remember it, then you should use the security from length of series of 5+ random words. It’s easier to remember, write down, and type. All great characteristics of a master passphrase.

[-] RecluseRamble@lemmy.dbzer0.com 8 points 5 months ago

I don't disagree, sorry if it sounded like I did.

There's just a theoretical weakness since the base word lists are usually public knowledge and bruteforcers could (and probably already have) optimize for that.

The advantages of a passphrase outweigh though as you mentioned. An attacker would first need your repo anyway.

[-] rockerface@lemm.ee 6 points 5 months ago

I'm adding obscure memes and anime references to my passphrases. Good luck bruteforcing that

[-] vorpuni@jlai.lu 1 points 5 months ago

Separating some of the words with random symbols also isn't too hard to remember and no chance that can be bruteforced.

[-] XTL@sopuli.xyz 4 points 5 months ago

Also, you don't need to write it down correctly, if you remember what's the missing or different or fake bit. And you can write down a few decoy ones next to it. Or have it in two different places. Lots of room for obfuscation along with some good old fashioned physical security on where you store the note. And the backup note off-site, if you're that kind of person.

Hell, just make some extra decoy ones just for fun and practice.

[-] lurch@sh.itjust.works 9 points 5 months ago

just make the password a little story you can remember, e,g. "Carl+Lenny:go2a bar&spend$$$"

[-] MeDuViNoX@sh.itjust.works 7 points 5 months ago

Hell naw, my last password was: Xé7&//sgn385d$@+îñccv72RtY¾ff°¥∆§

[-] BubbleMonkey@slrpnk.net 4 points 5 months ago

My strategy for this is to have a second password manager available on a couple old devices, accessed with biometrics (fingerprint in this case), and only the master password saved within it.

I considered saving it within the main manager itself, since I have devices where I can use biometrics rather than password, but that feels like a bad idea.

Has definitely been a life saver

[-] JackbyDev@programming.dev 3 points 5 months ago

Print out your recovery kit or master password and put it with your other documents (like birth certificate).

[-] KISSmyOSFeddit@lemmy.world 56 points 5 months ago

why is life like this?

Because someone else getting access to your email account nowadays is worse than losing your wallet, phone and keyring, combined.

[-] halvar@lemm.ee 26 points 5 months ago* (last edited 5 months ago)

why is life like this?

Because the whole thing started with anon forgeting their password, the solution for which should be complicated and secure, which it is.

[-] KISSmyOSFeddit@lemmy.world 8 points 5 months ago

I locked myself out of my main email account once.
I had set it up in the year 2000, when people didn't have mobile phones, so they sent a letter to your home address before they activated it.
In the meantime, I had moved 11 times, updated my personal info on the site a few times, but never added a phone number or recovery mail address.

So when I called the hotline and they asked me for my address to confirm I'm me, that was a hard one to answer. But I actually got it right in the second try, which was good enough.

[-] Aeri@lemmy.world 1 points 5 months ago

The new issue is that I don't remember the password for DICK. I know the password to like, my password manager, on a good day.

There are like 500 other passwords I have to sift through to sign into anything

[-] halvar@lemm.ee 1 points 5 months ago

Isn't that what a password-manager should solve?

[-] ICastFist@programming.dev 3 points 5 months ago

Yet having your phone stolen, which is usually worse than that, is super easy, and if you're being mugged, the criminal will also force you to remove the pin/lock because that takes less than a minute.

[-] TootSweet@lemmy.world 19 points 5 months ago

Websites need desperately to display their password creation rules on login pages. If I knew this particular site had (for some dumbass reason) a maximum password length less than the length of the password I'd otherwise use on that site or (also completely unreasonably) restricts special characters, I can more easily figure out what password I used when I signed up with fewer wrong guesses, all without sacrificing any security. (It's not like the rules aren't public info that anyone can get. Just don't make me go halfway through the signup process to get that information if I'm just trying to log in.)

[-] Vlyn@lemmy.zip 9 points 5 months ago

Use a password manager, no need to remember shit then (besides your master password). For example if you want a local solution KeePass and sync the file (I use Dropbox, it's encrypted anyway). You can also access it on Android with the sync.

[-] Martineski@lemmy.dbzer0.com 5 points 5 months ago

Oh yeah, that would be a huge QoL thing.

[-] KISSmyOSFeddit@lemmy.world -1 points 5 months ago

It would also let hackers know what combinations not to try.

I have a better proposal: If your login page has any restriction on passwords (other than being part of Unicode and a max length of 128 characters) then your site should be shut down.

[-] Martineski@lemmy.dbzer0.com 14 points 5 months ago

It would also let hackers know what combinations not to try.

You mean the exact thing they could learn by clicking on "sign up"?

[-] wagesj45@kbin.run 14 points 5 months ago

Life is like this because its easier on the developers than having to deal with the deluge angry customers losing all their shit to scammers because they use the same 5 character password for every site on the internet.

[-] Evotech@lemmy.world 17 points 5 months ago* (last edited 5 months ago)

Life is like that because some people are constantly trying to steal shit

[-] ryannathans@aussie.zone 11 points 5 months ago

Based and true

[-] NickwithaC@lemmy.world 8 points 5 months ago

If you'd pirated the game you would have spent all that time playing it instead.

[-] ICastFist@programming.dev 7 points 5 months ago

Write down your passwords on a piece of paper. That's literally more secure than keeping your stuff on your computer. It still won't stop the services from wanting to be double sure you're you because your browser's cookies got cleaned

Also, reset your steam password from a browser, never from the program itself. Fucking captcha never works properly on the fucking program.

[-] Mixel@feddit.de 5 points 5 months ago

I would argue that as long as you're careful not to get any malware keepassXC is a lot more secure and comfortable to use than tying out the passwords one by one again. Or in general your own vault warden server

[-] FrostyCaveman@lemm.ee 2 points 5 months ago
[-] varnia@lemm.ee 1 points 5 months ago
[-] Fizz@lemmy.nz 8 points 5 months ago

Nah this is actually how using steam + Gmail is.

[-] Martineski@lemmy.dbzer0.com 3 points 5 months ago

Nope, I shared my experience on discord in greentext format because I found the whole process funny (not hating on security) and then thought that it would be a good idea to post it on lemmy too.

this post was submitted on 05 Jun 2024
241 points (95.5% liked)

Greentext

4403 readers
1394 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 1 year ago
MODERATORS