Just got done investigating a spambot we had earlier, and it looks like they used a lot of compromised accounts on other instances to give their post an initial upvote boost. If you don’t already, please remember to use a good strong password. Keeping your account secure helps reduce spam across the whole of lemmy, and keeps your account from getting banned for things you didn’t actually do.

I recommend Diceware! I use it in my professional capacity as an IT/Security person, and also you get to use your mathrocks!

EDIT: Oh, also, all that numbers and symbols shit is no longer considered good practice. Just make it a really long collection of random words, at least 12, ideally 16+ characters. And make sure the words are actually random; your 3 favorite sports teams isn’t good enough, which is why I recommend diceware.

  • Aielman15@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    43 minutes ago

    Over the years, nobody has ever guessed my passwords, but four sites I was subscribed to were compromised and my email+password got leaked anyway.

    The strongest chain and the weakest link…

  • tyler@programming.dev
    link
    fedilink
    arrow-up
    10
    ·
    14 hours ago

    Random passwords are good practice, what isn’t good practice is following specific password requirements like 10 characters 1 uppercase, 1 symbol because that reduces your search space. A 30 or 50 character password generated by your password manager is always the most secure option, the longer the better. I generate passwords that go to the maximum the service allows.

    • kieron115@startrek.website
      link
      fedilink
      English
      arrow-up
      6
      ·
      12 hours ago

      these are called pass phrases and yes, they tend to be way more secure at least until quantum computers render all traditional cryptography meaningless.

    • sirblastalot@ttrpg.networkOP
      link
      fedilink
      arrow-up
      4
      ·
      13 hours ago

      Basically what diceware does. It’s just that humans are really bad at picking random words (“banana” is over represented, for instance) that’s what diceware helps with.

      • cassandrafatigue@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        1
        ·
        12 hours ago

        I used to use words from different vernaculars or languages. Sometimes i double check they are too abstract and weird to correct horse battery staple easily just because I’m a contrarian asshole snd thst helps me remember. exquisitevibrattoacquittalbevelschaudenfreude

  • PugJesus@piefed.social
    link
    fedilink
    English
    arrow-up
    14
    ·
    17 hours ago

    My password is ‘friend’, should I change it? I feel like it keeps all the nasty visitors out while letting the good folk inside.

  • exu@feditown.com
    link
    fedilink
    English
    arrow-up
    9
    ·
    17 hours ago

    Just make one super strong password, use that to unlock you password manager and have it generate 30 character passwords for everything.

    • Archpawn@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      14 hours ago

      Ideally all lowercase letters to make them easy to type when you need to use them in another device. Unfortunately, a lot of places don’t allow that, preferring less secure and more inconvenient passwords.

    • sirblastalot@ttrpg.networkOP
      link
      fedilink
      arrow-up
      1
      ·
      13 hours ago

      Password managers are OK but I have hesitations on them personally. I’m leery of putting all my most high-value stuff in one place behind one password. What I do instead is memorize a truly unreasonable amount of passwords, though, which I recognize is not a reasonable expectation for others. For threat models in which you’re not worried about in-person attacks, it may actually be a good idea to just write your passwords down, maybe keep your password book in something with a lock on it. I’m not advocating for any particular method, just putting it out there so people can make an informed decision.

      • Quetzalcutlass@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        7 hours ago

        I’m leery of putting all my most high-value stuff in one place behind one password.

        Password managers (at least the non-browser based ones) use methods provided by the OS to protect themselves from screen recording, direct memory reading and keyboard-sniffing. Most password managers can also be set up to require a keyfile and/or physical passkey to unlock their databases.

        A keyfile stores data necessary for decryption separate from the password database and means someone couldn’t get into your passwords even if your database was stolen and they knew the master password (assuming you stored your keyfile separate from the database - the file and its location should be treated like a password itself). A keyfile also lets you keep your database on cloud storage while manually transferring the key to trusted devices, allowing cloud syncing of your passwords without fear of leaks - without the keyfile it’s all just random data.

        A physical passkey makes it virtually impossible to breach the database unless someone steals the USB device, since it uses a challenge-response model and the data needed to spoof it should never leave the device.

  • Soot [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    17 hours ago

    To be fair, a ‘strong’ password isn’t likely to help all that much.

    Those compromised account lists are almost exclusively from websites that were hacked to harvest passwords, or didn’t hash their passwords sufficiently in the first place.

    Making a strong password is obviously ideal. But people are generally better off with some basic in-browser password management - avoid password reuse is the real big deal. Maybe diceware is the thing to use if there’s a specific password you need to actually remember and re-type across devices