• cloudless@piefed.socialOPM
    link
    fedilink
    English
    arrow-up
    4
    ·
    7 months ago

    But then the passphrase would be the same across different sites? If one site breaches the password then your other accounts would be at risk.

    • metaStatic@kbin.earth
      link
      fedilink
      arrow-up
      4
      ·
      7 months ago

      that’s the point of knowing it in different languages, I only need to remember CorrectHorseBatteryStaple but it can be totally different for however many different languages I can translate it into and of course the service name which I can have simple rules for inserting at the beginning, end, or between words.

      But again a hardware key is always my preference.

      • NightFantom@slrpnk.net
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        7 months ago

        So what if correcthorsebatterystaplefacebook gets leaked? You think a hacker won’t try correcthorsebatterystapleinstagram etc? You have one password for all sites with barely any extra steps

        Why not have a password manager which you unlock with (a different) easy to memorize but long enough password instead and truly random passwords?

        • metaStatic@kbin.earth
          link
          fedilink
          arrow-up
          2
          ·
          7 months ago

          barely any extra steps

          you have 5 attempts to get it in the right place (in this case), if this one is even in english (hint: if you don’t get locked out after 3 attempts it probably won’t be), if I don’t split compound words and treat them separately …

          all before 2fa and the fact I’ll use a yubi key over any of that shit in the first place if at all possible.

            • metaStatic@kbin.earth
              link
              fedilink
              arrow-up
              1
              ·
              7 months ago

              you’re literally just remembering 1 password and some simple rules to obfuscate it.

              people used to remember multiple whole phone numbers without issues.

              • NightFantom@slrpnk.net
                link
                fedilink
                arrow-up
                1
                ·
                7 months ago

                Either it’s simple for you and anyone reading one or two of your leaked passwords, or it’s not, you can’t have simple obfuscation rules that still work after a password reset or two and aren’t easy to reverse engineer. You can’t have complex rules that are hard to figure out for potential hackers, but easy to remember across password resets and multiple sites.

                That is, unless you write them down in a secure place, and then you make some application to fill them for you in your browser and… you just invented a password manager

      • lemming741@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 months ago

        What about length requirements and special character requirements? My mother-in-law has a paper list with six variations of the same password and another list of which site uses which variation.

        Capital letters, numbers, special characters, 16 character minimums, 12 character maximums. Has anyone tried to standardize these requirements yet?