"The implied attack assumes that MFA is not used or has been bypassed. If you can get access to download the encrypted database, like what happens with most password databases that are stolen, you donβt need to deal with MFA (or those pesky password lockouts) when making attempts thereafter."
hivesystems.com/blog/are-your-β¦
Are Your Passwords in the Green?
Passwords that felt secure a year ago might not hold up in 2025. Hive Systemsβ updated Password Table reveals just how much faster hackers can break into accounts today.Corey Neskey (Hive Systems)
like this
reshared this
Kenny Chaffin
in reply to diana π³οΈββ§οΈπ¦ • • •headrift
in reply to diana π³οΈββ§οΈπ¦ • • •Mine is stupid easy with four letters, one of them capitalized, seven numbers, and one punctuation for a total of 12 characters. Places keep telling me it's too easy, so I've got three more characters (two punctuation, one number) I can throw at it.
Some things, like gpg and Yahoo, still tell me it's too weak. I think it's a sign that the whole metaphor is played out... my memory is in danger of a buffer overflow
diana π³οΈββ§οΈπ¦
in reply to diana π³οΈββ§οΈπ¦ • • •like this
Andrew Pam and headrift like this.
Johannes Berg
in reply to diana π³οΈββ§οΈπ¦ • • •I get that this is, and has to be, a simplification, but I think it's misleading (or at least bordering thereon).
If you have no idea how the password is stored, it's misleading because it might well just be unsalted md5 and that's worthless. Or even stored plaintext π€·
If, on the other hand, it's competently done, then these days hopefully a bigger work factor (than 10) would be chosen (and hopefully updated to when you use the password), or maybe better yet argon2id instead with a suitable configuration.
Either way, there's really not a lot you can say about the security of a password without knowing the system it's used in.
like this
Jay Bryant, Andrew Pam and headrift like this.
diana π³οΈββ§οΈπ¦
in reply to diana π³οΈββ§οΈπ¦ • • •Jay Bryant
in reply to diana π³οΈββ§οΈπ¦ • • •Passwords are only the beginning of being secure. You should:
Monitoring is the real key. Play an active role in your own security by paying attention.
like this
Kenny Chaffin, β¨ββΎβ¬β βΌ βΏ and Johannes Berg like this.