8tpercent@lemmy.world to Technology@lemmy.worldEnglish · 1 year agoPasswordslemmy.worldexternal-linkmessage-square136fedilinkarrow-up1206arrow-down114file-text
arrow-up1192arrow-down1external-linkPasswordslemmy.world8tpercent@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square136fedilinkfile-text
minus-squareCorhen@lemmy.worldlinkfedilinkEnglisharrow-up2·1 year agoOk, fair, not all 32 digit passwords will be secure. 11111111111111111111111111111111 is not secure, but I was trying to imply, in a properly generated password, 32 digits long is very secure.
minus-squaregraphite@lemmy.worldlinkfedilinkEnglisharrow-up2arrow-down1·edit-21 year ago but I was trying to imply, in a properly generated password, 32 digits long is very secure. I understand, and I think you make a valid point as far as the discussion is concerned. It’s unfortunately still a little more complicated than that, though. Like I said, there’s more to a password than length and symbol type. Even something like cF*+@aXbIdFHje2vZiU-1 is less secure than if it were generated by a good PRNG. D0@ndro!dsDr@3@m0f3l3ctr!cSh33p? is also insecure, though it might have been considered secure 4-5 years ago. You see what I’m saying? Then of course there’s hash algorithms and how those are used to authenticate the passwords themselves, etc.
Ok, fair, not all 32 digit passwords will be secure.
11111111111111111111111111111111 is not secure, but I was trying to imply, in a properly generated password, 32 digits long is very secure.
I understand, and I think you make a valid point as far as the discussion is concerned.
It’s unfortunately still a little more complicated than that, though.
Like I said, there’s more to a password than length and symbol type.
Even something like cF*+@aXbIdFHje2vZiU-1 is less secure than if it were generated by a good PRNG.
D0@ndro!dsDr@3@m0f3l3ctr!cSh33p? is also insecure, though it might have been considered secure 4-5 years ago.
You see what I’m saying?
Then of course there’s hash algorithms and how those are used to authenticate the passwords themselves, etc.