• metaStatic@kbin.earth
    link
    fedilink
    arrow-up
    2
    ·
    7 months ago

    barely any extra steps

    you have 5 attempts to get it in the right place (in this case), if this one is even in english (hint: if you don’t get locked out after 3 attempts it probably won’t be), if I don’t split compound words and treat them separately …

    all before 2fa and the fact I’ll use a yubi key over any of that shit in the first place if at all possible.

      • metaStatic@kbin.earth
        link
        fedilink
        arrow-up
        1
        ·
        7 months ago

        you’re literally just remembering 1 password and some simple rules to obfuscate it.

        people used to remember multiple whole phone numbers without issues.

        • NightFantom@slrpnk.net
          link
          fedilink
          arrow-up
          1
          ·
          7 months ago

          Either it’s simple for you and anyone reading one or two of your leaked passwords, or it’s not, you can’t have simple obfuscation rules that still work after a password reset or two and aren’t easy to reverse engineer. You can’t have complex rules that are hard to figure out for potential hackers, but easy to remember across password resets and multiple sites.

          That is, unless you write them down in a secure place, and then you make some application to fill them for you in your browser and… you just invented a password manager