Data Privacy Day: Day 1

Post » Sun May 13, 2012 1:09 pm

Today is NOT Data Privacy Day. Data Privacy Day is Jan 28th, this Saturday. However, this year I am breaking up the Data Privacy Day thread into multiple, much more manageable chunks. This is part 1 and will cover a key aspect for all: Passwords.

Sections:
Day 1: http://www.gamesas.com/topic/1337235-data-privacy-day-day-1/
Day 2: http://www.gamesas.com/topic/1337699-data-privacy-day-day-2/
Day 3: http://www.gamesas.com/topic/1338134-data-privacy-day-day-3/
Day 4: http://www.gamesas.com/topic/1338605-data-privacy-day-day-4/
Day 5: http://www.gamesas.com/topic/1339018-data-privacy-day-day-5/
Day 6: Set up OpenVPN on Windows and Final Remarks

The goal, as always, is to make you more informed about your data and your privacy. I hope you find some of this information useful and put it into action. Security and privacy are constantly evolving items, and what cuts it today may not in the future, but this should be a good springboard to boost your security and privacy for Data Privacy Day and the years to come. As always, the level of security you need will differ from others, so you need to figure out what level is good for your needs. Some things, though, are universally applicable to all, such as a good Password system. Another thing to remember is that even if you follow the best of security practices, it may not be enough to stay safe if a company who has poor security practices gets hacked (and after this summer, I think we are all familiar with that)

Important definitions for this section:
  • Two-factor/multi-factor authentication: The use of two (or more) forms of authentication. They must be different forms, using two items of the same form does not qualify (so two passwords is still considered single-factor authentication). There are three forms of authentication:
    • Something you know (Password is most common, followed by a PIN, and in smartphones: a swipe pattern)
    • Something you have: A keyfile, ID card, or a token
    • Something you are: Anything biometric such as a fingerprint or iris scanner
  • Brute-force attack: A hacking attack where the hacker systematically tries every possible combination to gain access to your account
  • Dictionary Attack: A hacking attack where the hacker systematically goes through every word in the dictionary, followed by every name, followed by any personal information they know about you

Passwords


Passwords are the most common form of security online, and they aren't going anywhere any time soon. Unfortunately, passwords probably aren't the best form of security for numerous reasons: people can only remember so many good passwords (without using a manager or system, which I will talk about shortly) causing password reuse to be rampant, people can easily fall victim of social engineering (either in the form of spearheaded attacks or phishing), the rules for what you can include in a password are not universal (which causes problems for password creation systems), and they can be captured in transmission. Still, as I mentioned, they aren't going away any time soon and making your passwords good is a very simple thing to do.

Let's start with some questions about your current passwords:
1. Do you use the same password everywhere or almost everywhere?
2. Are your passwords less than 12 characters in length?
3. Do your passwords contain a word from the dictionary or a name properly spelled?
4. Is one (or more) of the following missing from your passwords: a lower-case letter, an upper-case letter, a number, or a special character?

If you answered "Yes" to the above questions, there's a good chance your passwords are weak. If you see your passwords on this list of the http://mashable.com/2011/11/17/worst-internet-passwords/, then even moreso are your passwords weak as they are on every password list out there. Some other lists are http://www.tomshardware.com/news/imperva-rockyou-most-common-passwords,9486.html, http://www.whatsmypass.com/the-top-500-worst-passwords-of-all-time, and http://blog.jimmyr.com/Password_anolysis_of_databases_that_were_hacked_28_2009.php (I quite enjoyed the character frequency anolysis, might give you some ideas for characters to use)

So what is wrong with those 4 things?

1. When you use the same password everywhere or almost everywhere, if any site gets hacked or you slip up and give out the password just once, all or almost all your accounts are compromised. -- http://xkcd.com/792/
2. The shorter the password, the easier it is to crack. In some instances, short passwords use weaker hashing algorithms in general than longer ones (for example, Windows XP passwords under 15 characters use LM Hash, which is extremely weak, passwords with 15+ characters use NTLM)
3. Words and names are extremely easy to crack with a modern PC by just doing a dictionary attack. It's all the easier if you have a botnet or supercomputer trying all the possibilities.
4. The more variance in your password, the better. Having at least one of each character type significantly boosts your password strength compared to not. Once you leave alphanumeric passwords, the chances of your password being in a dictionary list, once you get past simple substitution and just appending special characters at the end or beginning, you can even beat many pinpointed attacks such as those that can be created by the http://www.securitytube.net/video/2018

So, just how secure is your current password? http://howsecureismypassword.net/. If you are paranoid (which in this case is NOT a bad thing), you can view the source. It all runs locally and sends nothing back, it even works fine in offline mode. Still a little anxious about entering your password? Just type in something that is similar to your password. So long as you use the same number of each characters it'll return a similar value. Note that the time that how secure is my password tells you is a best-case scenario, so if you have something like 3.2 years, it can probably be done in a few weeks using CUDA and good NVidia GPU.

Further reading: http://onemansblog.com/2007/03/26/how-id-hack-your-weak-passwords/ -- a bit on the old side, but still a great read.

Keeping Track of your Strong Passwords


The problem with creating a bunch of strong passwords is that it's hard to keep track of them. As I mentioned, this is one of the problems with the password system. Thankfully, there are things you can do about it. I personally have over 100 passwords and have no issue entering them in when needed. The trick is to not memorize all your individual passwords (I personally only have maybe 10 passwords committed to memory).

One of the more simple ways to do this is, rather than memorizing your passwords, you memorize an algorithm, or system, to creating them. That way, even if you forget the password, you can easily reverse engineer what the password would be. The password remains strong and only those that know the algorithm can come up with the password. The Mozilla Team created an excellent video on this that you can watch http://support.mozilla.org/en-US/kb/Choosing%20More%20Secure%20Passwords.

There are problems with algorithmic passwords, though, one of them going back to a flaw with the password system as it exists: the rules for what you can have in your password are not uniformly followed by all sites, so your password algorithm may not work for all your sites. In general, I'd say you need at least 4 or 5 algorithms to cover all your sites, assuming all of them allow all characters: a sub-8 character algorithm, a sub-15 character algorithm, a sub-20 character algorithm, and a 20+ character algorithm. This is due to various sites putting limits on password length, a very unwelcomed problem in my book that I wish would go away. The fifth algorithm you may want to implemtn is a separate algorithm for the most important of sites, such as your bank and email. Even so, remembering 5 algorithms is relatively simple to do, especially compared to remembering 30 different passwords (much less, 100 different passwords).

The other option (and it's not an exclusive other option, you can more than easily implement both) is to use a password manager of some kind. There are many out there, but the good ones in my book are: KeePass, LastPass, a physical password list you always keep on you, and an encrypted digital password list. The first two are real password managers, the other two are merely a secured list of passwords. The difference is that a password manager helps simplify entering in your passwords (and that may be an issue with long, complex passwords).

You may be thinking "What's wrong with my browser's password manager?" and the truth is: many things. Firstly the encryption on the password database isn't very strong. It is extremely easy to brute-force the encyption and many tools do it. Or even more simply, just copy those files over to another computer and place them in the application directory for the same web browser, and the browser will be able to use them (unless you enable a master password) and if these are password databases for Google Chrome or Firefox, they are viewable as well (once again, unless a master password is set). Opera is a step up in that it will never show you the passwords, just the username, but the encryption is still weak and plenty of tools will crack it to display all your passwords. I really cannot recommend Chrome's password manager at all as there is NOTHING you can do at the current time to secure it on Windows. If using Chrome, you really do need to use a third-party password manager. Both Firefox and Opera aren't much better off, but if you are going to use them, you do have some options. You may scoff that no one will get physical access to your computer, but they don't need to on Windows machines. A brower's password database is stored in %AppData% which is easily accessible remotely thanks to it being included in Window's default share for user profiles. Even if you disable that, the admin share of C$ will include it (of course now I'm starting to delve into network security, which isn't supposed to be in this topic much).

Firefox's built-in password manager:

First download the https://addons.mozilla.org/en-US/firefox/addon/master-password/ addon and set a master password. A quality meter will tell you how strong it is. Set up an auto-logout time. You will never be prompted for your master password so long as you don't time out, but if you do you'll need to re-enter it again. Either leave it on a short time but only when inactive or set it to a long time (an hour or so) but always times out. Which to choose depends on your browsing habits and how easily you are annoyed.

Opera's built-in password manager:

Opera's password manager is a bit more feature-rich than Firefox's and so is it's master password, which is good since there is no extension for it. Tools -> Preferences -> Advanced -> Security -> Set Master Password... and set your password. Set your timeout interval (right underneath it called "Ask for password") as you feel appropriate. Setting it to "Every time needed", the default setting, will probably drive you mad, an hour is good. Finally make sure to check the box for "Use master password to protect saved passwords". If you don't, the master password only applies to client certificates.

As I said, Firefox and Opera's password manager are only marginally better than Chrome's even with the master password, so a third-party password manager is still best as the encryption is many times better. If you do use them, at least think twice about giving them important passwords for things like your bank account. Please consider one of these good password managers instead.

The Good Password Managers


http://keepass.info/: KeePass 2 is a Password manager for Windows. That said, it is becomming easier and easier to install on Linux and Mac OS X so long as you don't mind Mono being installed as well to the point it is pretty much cross-platform (just no official releases for Mac OS X or Linux are made). Mac OS X users can head http://keepass2.openix.be/ for an installer and Debian/Ubuntu users have it in the http://packages.debian.org/sid/keepass2 or via https://launchpad.net/~jtaylor/+archive/keepass. Alternatively there is http://www.keepassx.org/ which is fully cross-platform, but it only works with 1.0 databases and doesn't work with browser extensions such as KeeFox, ChromeIPass, or PassIFox. You give it a master password, and, optionally, you can create a keyfile (this is known as two-factor authentication. See "Important Definitions" at beginning of post). Now you only need to remember one password and all your passwords are secure.

As mentioned there are various plugins for browser integration with KeePass to make entering passwords even simpler than it already is. This includes https://addons.mozilla.org/en-US/firefox/addon/keefox/ (probably the best integration, but Windows-only), https://addons.mozilla.org/en-US/firefox/addon/passifox/ (not as good as KeeFox in my opinion, but works on Mac OS X and Linux as well as Windows), and https://chrome.google.com/webstore/detail/ompiailgknfdndiefoaoiligalphfdae (which is the Google Chrome/Chromium option and also works on Mac OS X and Linux as well as Windows). Of course KeePass works with all browsers and pretty much all applications through an auto-type feature + a keyboard shortcut (default: Left-Ctrl+Alt+A but easily changable to your preference) so you don't have to worry about a plugin if you don't want to. There is also a portable version available, so you can run it on the go from any Windows computer.

Finally, in the modern world where smart phones are of great importance, there are programs compatible with KeePass available on all major smartphone platforms: https://market.android.com/details?id=com.android.keepass&hl=en for Android, http://7pass.wordpress.com/ for Windows Phone 7, and either http://itunes.apple.com/app/id451661808 (free) or http://itunes.apple.com/us/app/mykeepass/id353354895?mt=8 ($0.99) on iOS.

Pros: Open Source, you control it, portable, highly secure, will tell you the strength of your passwords, can generate random passwords, works with pretty much any program. Works on Android/WP7/iPhone too.
Cons: The auto-type feature takes a little getting used to, while it works with any pretty much program the overall integration suffers to allow this (Except in Firefox/Chrome where KeeFox/PassIFox/ChromeIPass creates seamless integration).

http://lastpass.com/: LastPass is a cloud-based password manager that works in all major browsers and the browser version is cross-platform. There is a desktop version for application passwords and whatnot, but it currently only works on Windows and requires a Premium (paid) account. It also does not appear to have a keyboard shortcut auto-type feature like KeePass. You can find more information about the Desktop version for applications on their http://helpdesk.lastpass.com/upgrading-to-premium/lastpass-for-applications/. Likewise for smartphone use, you need a Premium (paid) account; apps for all major smartphone platforms exist. Offline access to your passwords is possible through a cross-platform program called LastPass Pocket and is available with a free account. They also offer One-time Passwords for use on untrusted computers that instantly expire (which reduces the risk of your master password being compromised).

Pros: always with you so long as you have Internet Access, instantly syncs, highly integrated, audits your passwords, can generate random passwords, one-time passwords, very secure (before you ask: It's been verified that LastPass NEVER gets your encryption key -- http://tinisles.blogspot.com/2010/01/should-you-trust-lastpasscom.html)
Cons: You must trust that they will stay around, if your Master LastPass password is compromised, all your passwords are compromised*

*Note: LastPass Premium offers two-factor authentication (http://helpdesk.lastpass.com/security-options/sesame-multifactor-authentication-with-a-usb-thumb-drive/). The Free version has http://helpdesk.lastpass.com/security-options/grid-multifactor-authentication/, which I don't quite consider unique enough of "something you have" to be two-factor authentication, as if someone knows what your card looks like, they can access your account without actually having your card, but still a significant security boost. One-time Passwords also lower the risk of your master password being compromised.

Keeping a list always on you: Obviously no software is involved, you just simply keep a list on you at all times, say in your wallet (or anywhere else, so long as you always remember to keep it on you). This method, while once frowned upon, has been gaining popularity in recent years among security experts*. Why? Because it is always on you, so you know it is safe. If it isn't on you, then you know it is time to change all your passwords. For extra security you can do a trick to the list that only you know. For example: inject a random number in every password at a specific spot (or in a pattern that you know). If the list falls into the wrong hands, they can't tell those numbers aren't part of the actual password and as such cannot use your passwords right away or at all. This gives you more than enough time to verify you didn't just leave the list at home and to change your passwords to something secure again.

Pros: Pretty secure, you are instantly aware if your password database is compromised since it is always on your persons. Always with you in all circumstances
Cons: You must diligently keep it always on you for the security aspect, obviously if you do no trick and lose the list, all your passwords are potentially compromised, likewise it is obviously 100% manual.

*http://en.wikipedia.org/wiki/Bruce_Schneier on writing down your passwords(http://www.schneier.com/crypto-gram-0105.html#8):

1. Passwords. You can't memorize good enough passwords any more, so don't bother. Create long random passwords, and write them down. Store them in your wallet, or in a program like Password Safe. Guard them as you would your cash. Don't let Web browsers store passwords for you. Don't transmit passwords (or PINs) in unencrypted e-mail and Web forms. Assume that all PINs can be easily broken, and plan accordingly.

Encrypted Digital Password List: To some, a digital password list would be preferred to a normal one. There are risks to leaving your passwords just in plain text on your computer through (some malware looks for things like passwords.txt and whatnot and uploades them to some far-off place), so encryption is a must. The advantage of a digital list is it's easy to back up, lowering the risk of you losing it as well as allow you to synchronize the file onto multiple computers (though it begs the question: why not just use a password manager?). A simple and effective cross-platform encryption program is http://www.truecrypt.org/. TrueCrypt is an on-the-fly encryption tool and allows you to create encrypted file containers in which you can store your password list.

Pros: Extremely secure. Truecrypt in particular offers many options for creating your encrypted file container (including a hidden volume).
Cons: Obviously not integrated at all with any application, so you must do everything manually. Must use a third-party program to synchronize the file across computers.

Some Mac OS X-specific Password Managers:

https://agilebits.com/onepassword -- It's also available on Windows, iOS, and Android, but I'd only recommend it if you don't want to deal with KeePass 2 with Mono and Mac OS X is your primary OS. It's free only for 20 or fewer passwords, otherwise you have to pay, and it's on the expensive side ($50 for one license for one desktop platform, $70 for a license for both desktop platforms, $100 for 5 licenses for both desktop platforms). Still, it's very user-friendly on Mac OS X.

Keychain -- Keychain is the default password manager for Mac OS X, but it's not without flaws that have come up over the years (usually patched though). It can be integrated with both http://newmacuser.com/usernames-and-passwords-from-the-keychain-in-safari/, Google Chrome (uses it by default), and https://addons.mozilla.org/en-us/firefox/addon/keychain-services-integration/, but it's not easily synchronized across your computers and definitely not cross-platform or portable.

Passwords - the remaining stuff


First: To note, there are other methods for creating secure passwords. Popular ones include using phrases from a book or song, and recently just stringing together 4 random funny words, popularized by an http://xkcd.com/936/. If these methods work for you, that's great, but personally I see them as relying too much on human memory, which is too easily fallible. There's no way I'd be able to keep track of all 100+ of my passwords by using different strings of 4 random words or remembering which phrases from a book go with which sites. I see these methods, in the long run, as encouraging password reuse. Password reuse is the enemy to be stopped at all costs, as password databases get compromised, and once you start repeating password -- no matter how strong, you run the risk of multiple accounts being compromised from a single password leak. Still, if you only have a handful of passwords, these methods can create strong passwords provided you can remember them.

At this point your passwords are nice and complex, secure, and easy to remember/access, but that is not all there is to say on password security. Remember those password hints and pesky security questions you set up for most services? Those can be an Achilles heel to your accounts if you are not careful.

For password hints there are a few things you can do: You can do away with them completely, typing in gibberish when forced to have one (what I currently do), or you can use things you know you know to help you remember the pattern you use for your passwords. Along the lines of http://www.youtube.com/watch?v=nFz_7HttWa0 - It means absolutely nothing to anyone but you. In all cases you should be careful here and any hint you give should use word associations or have a meaning that only you would understand relying on your personality or life.

Security questions are similarly a dangerous thing, much more dangerous than password hints as they can reset your password. Weak questions mean your strong password is worthless. If you are confident in your passwords to the point you are certain they will never be forgotten, once again you can make these complete gibberish so they are impossible to break into. Security questions have two pitfalls: 1. They are susceptible to social engineering since they are questions about you. Make sure you NEVER post your answers to your security question anywhere ESPECIALLY social network sites like Facebook and Myspace. If you do that, then all your security efforts go down the drain. 2. is security questions are often just a word or name, making them HIGHLY susceptible to dictionary attacks if the security questions don't have a lock-out. To combat this make your answers always at least two words, and maybe throw in a special character at the end or the beginning that is your "trick" for them. One thing growing in popularity that does a good job to combat both, is to create a pattern to your security questions that does not answer them and only you know -- (http://www.zephoria.org/thoughts/archives/2007/11/15/algorithms_for.html). My advice is to do that, but also make sure to include a special character or two.

If you follow through with everything, your passwords will be very secure and any backdoors effectively shut to anyone but you.
User avatar
Dominic Vaughan
 
Posts: 3531
Joined: Mon May 14, 2007 1:47 pm

Post » Sat May 12, 2012 9:51 pm

28th is miy birthday as well :P
User avatar
Miss Hayley
 
Posts: 3414
Joined: Tue Jun 27, 2006 2:31 am

Post » Sun May 13, 2012 1:50 am

Where would we be without Defron to show how little we understand our own computers and computing habits? :D

Great work as always, mate! :goodjob:
User avatar
loste juliana
 
Posts: 3417
Joined: Sun Mar 18, 2007 7:37 pm

Post » Sat May 12, 2012 9:56 pm

Well, my old password would have taken 4 days to crack, I'm assuming that's somewhat good, at least for what it was.
User avatar
neil slattery
 
Posts: 3358
Joined: Wed May 16, 2007 4:57 am

Post » Sun May 13, 2012 9:48 am

Just when I'd gotten over all the leftover paranoia from the last time DEFRON educated us... :P
User avatar
Heather beauchamp
 
Posts: 3456
Joined: Mon Aug 13, 2007 6:05 pm

Post » Sun May 13, 2012 8:19 am

2. Are your passwords less than 12 characters in length?


[...]

2. The shorter the password, the easier it is to crack. In some instances, short passwords use weaker encryption in general than longer ones (for example, Windows passwords under 15 characters use LM Hash, which is extremely weak, passwords with 15+ characters use NTLM)
Uh. Windows doesn't encrypt your password, it hashes it. (encryption functions are bijective, hash functions aren't. Big difference :smile: ). Also, LM Hash isn't used by default in any modern OS so isn't really a valid reason.

I also am not sure of the point in passwords over 12 characters. For my bank it is fairly long. For general (non money handling) websites? I don't think it really matters that much as long as it is unique(ish).

For my home computer? If someone really wants my data they can just take the harddrive out. http://xkcd.com/538/.



Personally? There are about 3 passwords I give a damn about. (Bank, Email, Server). The rest I may be a bit annoyed if I lost them but meh, I am not special enough to care. The other options are too much of a pain to have a huge long unique password for every site (I do have a unique password for all sites) and the disadvantages of password manages are too large in my opinion.
User avatar
Chloe Lou
 
Posts: 3476
Joined: Sat Nov 04, 2006 2:08 am

Post » Sat May 12, 2012 10:10 pm


Uh. Windows doesn't encrypt your password, it hashes it. (encryption functions are bijective, hash functions aren't. Big difference :smile: ). Also, LM Hash isn't used by default in any modern OS so isn't really a valid reason.
Quite right, that part was bad copy&pasting on my behalf. And while LM Hashing isn't default anymore, XP still makes up about 50% of the market, so I personally still think it is a valid point.

I also am not sure of the point in passwords over 12 characters. For my bank it is fairly long. For general (non money handling) websites? I don't think it really matters that much as long as it is unique(ish).
When using a password manager, length becomes pretty much irrelevant, so exceeding 12 characters is simple. I have a personal believe "every account is important" so try my best to give the best for every account. For others this may not be an issue ("it is just a forum afterall"), but whether algorithmic passwords or a password manager, exceeding 12 is a simple feat.

For my home computer? If someone really wants my data they can just take the harddrive out. http://xkcd.com/538/.
I think for most people's computer's they wouldn't even have to go that far :P
User avatar
Kitana Lucas
 
Posts: 3421
Joined: Sat Aug 12, 2006 1:24 pm

Post » Sun May 13, 2012 7:55 am

I have to admit, my first password I used was the single most terrible password ever. I think I only used it for a thing called IRC-gallery or something, probably 5-6 years ago. The password was bond007. Oh my ***** what an ***** I was back then. Definitely worth thinking about your password.
User avatar
Emma Pennington
 
Posts: 3346
Joined: Tue Oct 17, 2006 8:41 am

Post » Sun May 13, 2012 1:12 pm

Quite right, that part was bad copy&pasting on my behalf. And while LM Hashing isn't default anymore, XP still makes up about 50% of the market, so I personally still think it is a valid point.
Well, if people would use a 8 year old OS as their primary OS :P

When using a password manager, length becomes pretty much irrelevant, so exceeding 12 characters is simple. I have a personal believe "every account is important" so try my best to give the best for every account. For others this may not be an issue ("it is just a forum afterall"), but whether algorithmic passwords or a password manager, exceeding 12 is a simple feat.
Yeah, I am just not bothered enough about most things. (And don't want to use a password manager as I don't always carry a phone and log into far to many different computers).

You are still reliant on a decent server implementation as well, which isn't always going to happen.
User avatar
Joanne Crump
 
Posts: 3457
Joined: Sat Jul 22, 2006 9:44 am

Post » Sun May 13, 2012 9:28 am

My password (according to the link) would take 13 trillion years... lol
User avatar
Sierra Ritsuka
 
Posts: 3506
Joined: Mon Dec 11, 2006 7:56 am

Post » Sun May 13, 2012 8:27 am

Yeah, I am just not bothered enough about most things. (And don't want to use a password manager as I don't always carry a phone and log into far to many different computers).
And, I assume, don't want to trust the cloud (though I don't blame you for being leery of that for everything). My method for propagating my password database has been good ol' fashioned sneakernet and sftp (though none of these databases store my super-important passwords, which never leave the house).

You are still reliant on a decent server implementation as well, which isn't always going to happen.
Oh yes. Unfortunately I couldn't find the link, but I had a link to a site that had a "wall of shame" of a bunch of websites that were found out to store and send credentials in plaintext. No major site was on there, but undoubtedly a few do store them as such.
User avatar
Nick Swan
 
Posts: 3511
Joined: Sat Dec 01, 2007 1:34 pm

Post » Sun May 13, 2012 9:45 am

And, I assume, don't want to trust the cloud (though I don't blame you for being leery of that for everything). My method for propagating my password database has been good ol' fashioned sneakernet and sftp (though none of these databases store my super-important passwords, which never leave the house).
It is more the possibility of data loss combined with the pain of not always having much technology around and needing to log into somewhere in a hurry.

Oh yes. Unfortunately I couldn't find the link, but I had a link to a site that had a "wall of shame" of a bunch of websites that were found out to store and send credentials in plaintext. No major site was on there, but undoubtedly a few do store them as such.
Even if they store them in something like md5 without salting with a 100 character password P, there will be a R such that md5( R ) = md5( P ), P /= R.

My general experience is that it is hard to get security right. Really hard.
User avatar
Miranda Taylor
 
Posts: 3406
Joined: Sat Feb 24, 2007 3:39 pm

Post » Sun May 13, 2012 2:10 am

Any tips on creating memorable passwords?

I just used their password generator and it told me it would take about 523 sixtillion years to crack it.

sixtillion... Hehe... Hehehe...
User avatar
Jaki Birch
 
Posts: 3379
Joined: Fri Jan 26, 2007 3:16 am

Post » Sun May 13, 2012 12:43 pm

I still have your last years post regarding data privacy copied to a word file and saved to my desktop, thanks to you I now have all unique and strong passwords (at least, when the service actually allows a long password with special symbols). Only thing I have left to do is to store those passwords on a different location (a fire or burglary would really screw me over right now), but I don't want to store them on the internet.

In any case, thumbs up. :thumbsup:
User avatar
Rachel Tyson
 
Posts: 3434
Joined: Sat Oct 07, 2006 4:42 pm

Post » Sun May 13, 2012 12:12 pm

My password would take 1 year to hack...

...but...

dammit, now I'm just having a ton of fun trying to get the highest amount of years possible.


It would take a desktop PC
About 11 googol years
to hack your password

What the flipping hell is a googol?
User avatar
Karl harris
 
Posts: 3423
Joined: Thu May 17, 2007 3:17 pm

Post » Sun May 13, 2012 1:02 am

tl;dr
well yeah password security is important
User avatar
Ridhwan Hemsome
 
Posts: 3501
Joined: Sun May 06, 2007 2:13 pm

Post » Sun May 13, 2012 4:07 am

What the flipping hell is a googol?
10,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000,-000
User avatar
Andrew Lang
 
Posts: 3489
Joined: Thu Oct 11, 2007 8:50 pm

Post » Sun May 13, 2012 9:09 am

Thanks for the informative post, Defron! :thumbsup: When it comes to passwords, I'm pretty paranoid. I have about 40 different passwords at various sites. I've memorized most of them, but I also keep a "hint" list handy. The hints are extremely obscure, with meanings known only to me. Even people who know me best can't figure them out, and they've tried (I've got a cousin who's been trying for three years to crack just one of mine). According to http://howsecureismypassword.net/, the password he's trying to figure out would take a desktop PC about 15 quattuordecillion years to figure out. (Note: for those who are curious, a quattuordecillion is the number 1 followed by 45 zeros. Since the universe itself hasn't been around for even one trillionth of that time, I think it's somewhat secure.)

Another one I use would take about 1 quintillion years to hack. Not quite as long, but still longer that time itself has been around. Not sure if that's secure enough for my tastes, though.
User avatar
Cathrine Jack
 
Posts: 3329
Joined: Sat Dec 02, 2006 1:29 am

Post » Sun May 13, 2012 11:26 am

Still remember that article about that website getting hacked that deals with defense departments for the United States. Some of those passwords were shameful with the absolute worst one being password1234. (Yes I [censored] you not the password was password1234)

Since that incident with SoE where they got hacked I changed all of my passwords interweaving alphanumerical special characters together to make them stronger. Definitely seen something with atleast 3 numbers and the rest being alphabetical characters to make it somewhat decent. The inclusion of special characters just ups your chances of the password being secured from what I hear.

A good password would be something like M9XT!A01ORE6^ which would take a heck of a long time for something to crack.
User avatar
Cassie Boyle
 
Posts: 3468
Joined: Sun Nov 05, 2006 9:33 am

Post » Sun May 13, 2012 1:19 am

Still remember that article about that website getting hacked that deals with defense departments for the United States. Some of those passwords were shameful with the absolute worst one being password1234. (Yes I [censored] you not the password was password1234)

Since that incident with SoE where they got hacked I changed all of my passwords interweaving alphanumerical special characters together to make them stronger. Definitely seen something with atleast 3 numbers and the rest being alphabetical characters to make it somewhat decent. The inclusion of special characters just ups your chances of the password being secured from what I hear.

A good password would be something like M9XT!A01ORE6^ which would take a heck of a long time for something to crack.
If you aren't incorporating sheer length (anything short of 20 alphanumeric doesn't cut it when going alphanumeric in my book, No way would I consider 3 numbers and say 10 or so letters a secure password under any pretense), I'd say special characters are pretty much a must. Inclusion of a few special characters pretty much nulls any chance of any precomputed table of reasonable size including your password. It also greatly decreases the chance of a successful bruteforce attack. There's no "just" about it, it's pretty much a must from my standpoint.
User avatar
Dustin Brown
 
Posts: 3307
Joined: Sun Sep 30, 2007 6:55 am

Post » Sun May 13, 2012 12:10 am

Your thread from last year is still alive. :biggrin: That's what got me onto KeePass. My database password (the only password I have memorized :confused: ) would take 2 decillion years to crack. I could probably go even further as memorizing one really long password is easy, I just can't remember any more.

I really need to check what my security questions are. :ermm:

Oddly enough my first password was something I needed for computer class and it was totally random. Like 8zxvg236jfda and I memorized that. But when I started using the Intranets and making accounts I regressed and just went with 1 to 2 passwords that were a bit too simple. Though I suppose the password I used for email wasn't too bad. Basically kept that up until I started using KeePass after last year's post but the couple of passwords I used probably changed a couple of times over the years - for better or for worse.

Now where is that +rep button? I'm giving you ALL the rep. :thumbsup:

On a side note, KeePassDroid was just updated in the past few days after not having any updates for months. Wasn't much and still no full KeePass 2 database support (currently read only) but at least the dev is active again.
User avatar
Sasha Brown
 
Posts: 3426
Joined: Sat Jan 20, 2007 4:46 pm


Return to Othor Games