Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.os.linux    |    Getting to be as bloated as Windows!    |    107,822 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 106,301 of 107,822    |
|    Gordinator to Alan Browne    |
|    Re: RockYou2024 leak of 10 billion passw    |
|    07 Jul 24 18:27:18    |
      XPost: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone       XPost: comp.sys.mac.system, alt.privacy       From: gordinator@gordinator.org              On 07/07/2024 12:26, Alan Browne wrote:       > On 2024-07-06 19:28, Mickey D wrote:       >>       >> "Threat actors could exploit the RockYou2024 password compilation to       >> conduct brute-force attacks and gain unauthorized access to various       >> online       >> accounts used by individuals who employ passwords included in the       >> dataset,"       >> the team explained.       >       > Why Passkeys should be used wherever financial transactions or sensitive       > information are concerned. Or at least TFA.       >       > And passwords need to be strong - computer generated is always best.       >       > Otherwise password access should have time outs.       >       > 1st time wrong: no delay       > 2nd time wrong: 1 s delay       > 3rt time wrong: 2 s delay       > 4th time wrong: 4 s       > 5 8 s       >       > 10 4 hour delay, then reset to 0 delay.       >       > Brute force login attacks would simply not work.       >              A better solution would be to use a hashing algorithm like Argon2 that       is designed to be resistant to such attacks. That way, if you get       offline access to a database somehow - which is how these passwords were       derived - cracking takes a stupid amount of time.              Such modern algorithms use things like salting by default as well, which       eliminates rainbow table attacks (pre-computed lists of hashes and their       passwords), meaning you need to perform the slow and expensive       brute-force method.              Also, a timeout would only help with online logins. Offline ones are the       real deal, because you can go ham with no consequence.              That said, your idea of using computer-generated passwords is great. I       use 64-character random passwords generated by KeePassXC. It works       great, except for the websites that want shorter passwords, for some       bizarre reason.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca