fubar57
General
Simple easy to remember passwords can be made hard if you insert punctuation marks in them, ie….?fubar?57? Not that that's my password…..nope….that is for sure
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Ad: This forum contains affiliate links to products on Amazon and eBay. More information in Terms and rules
So, that doesn't necessarily translate into compromised, as in some one else has stolen it? If I use the same password on, say 5 different accounts, then I will get 5 hits, right? I would consider that as still secure. If I get 25 hits, then the password definitely needs changing.Have I Been Pwned: Pwned websites
Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.haveibeenpwned.com
This list shows most recent breaches.
The collection of accounts and passwords comes from data breaches, which happen more often than you'd think. The number of password compromises is high for weaker passwords that many users are using.
As example years ago Linkedin was breached and the password I used showed up on this list, but it was only a count of 1
However if you check the password: "password" on the site you get a count of 3,861,493
The difference was the password I used was unique thus one hit, but "password" was used by many more accounts thus more hits. So the higher the count the more the password has showed up in breaches, which typically means it's weaker and simultaneously used by more people.
Totally understood and the heads-up is much appreciated. In my case the passwords that have hits are not associated with any financial or personal (medical for instance) sites. Although a few sites that have passwords that have hits are ones that I have done e-commerce through. I will change these for sure even though my CC info is not stored on any of them..Like Marcel said, if it shows up in the database whether 1 or 10,000 that password is known to nefarious actors, thus compromised. Maybe they use it maybe they don't.
Ralph Haus if you're looking for an analogy to better understand let me try this. It'd be like leaving the windows down in your vehicle. Maybe people walking by don't grab anything, but maybe some do. It's not much effort for a third party to gain access. Best would be to put up the windows, and make access a much more difficult endeavor.
The forum software was updated on October, 7th 2021. With the update came a feature which checks your password against a database of exposed passwords. If your password is found to have been exposed at some point in time the system will alert you. You can perform your own password check against the same database at Have I Been Pwned: Pwned Passwords
If you receive an alert it means your password was found to be exposed. For security it would be best to change your password.
FYI your password is not checked in the clear but via a anonymized hashing process I've Just Launched "Pwned Passwords" V2 With Half a Billion Passwords for Download
No. The hash is not what leaks. It's the password. A hacker cannot do anything with the hash as it's virtually impossible to regenerate the password from the hash. You cannot login with the hash. Every site uses a different hash as they all have different seeding.Wouldn't it make more sense if, instead of everyone having to come up with different passwords for every account, every website uses a different hash? Then, matching hashes would signify nothing and hackers would not be able to infer anything from them. Ah, but that would require them to assume some responsibility for securing their site.
Yea that does exist to this day. TLS is based on public/private key exchange. The thing is keeping track of your private and public keys is not as simple as a password.Wouldn't it make more sense if, instead of everyone having to come up with different passwords for every account, every website uses a different hash? Then, matching hashes would signify nothing and hackers would not be able to infer anything from them. Ah, but that would require them to assume some responsibility for securing their site.
Your "real world" reminds me of one of my favorites:Yea that does exist to this day. TLS is based on public/private key exchange. The thing is keeping track of your private and public keys is not as simple as a password.
It is a tremendously hard problem to solve. The big kids Google, Microsoft, Amazon, Apple etc have all thought hard about passwords and authentication. The best they have come up with is two-factor to make up for potentially weak passwords/hacks. Not super elegant and not bulletproof. Does Jack Dorsey's Twitter Account hack mean two factor authentication is waste of time? - Thales blog It's hard to verify identity across the internet in a non intrusive fashion. The real world still is best. It's like going to the bank and dealing with the same teller for ages. There is am implicit authentication that occurs that is very hard to seamlessly replicate on internet.
There are devices like yubikey which add a hardware authentication to the loop. However, that has only been adopted by the few and corporate access. Not a mainstream occurrence. If you can solve the problem w/o complication you'll ride the wave to big bucks!
That's not an unrealistic application. I have some simple ones I use for stupid internal stuff. Passwords again not a great solution.Ok, I just got my alert. Some time ago, I decided that I have just too many accounts to have a unique password for every one. So I started using simple, disposable passwords for all those many accounts that are non-essential, or where it is just not a big deal if it got hacked. Most of these are even more simply the same password. Then I have complex, sometimes unique passwords for those sites that I consider critical. My list of password-"protected" sites numbers over 200. I suspect less than 10% of those I really care anything about. Don't take offense, but why should I care if my account on this forum is compromised? Someone's going to post something to make me look foolish? I can do that well enough myself. Money accounts, that's something else. What, really, do most passwords accomplish?