Luckily for me my password is ******
Edit: weird lemmy automatically replaced my password with '*'
A community for discussing events around the World
Rule 1: posts have the following requirements:
Rule 2: Do not copy the entire article into your post. The key points in 1-2 paragraphs is allowed (even encouraged!), but large segments of articles posted in the body will result in the post being removed. If you have to stop and think "Is this fair use?", it probably isn't. Archive links, especially the ones created on link submission, are absolutely allowed but those that avoid paywalls are not.
Rule 3: Opinions articles, or Articles based on misinformation/propaganda may be removed. Sources that have a Low or Very Low factual reporting rating or MBFC Credibility Rating may be removed.
Rule 4: Posts or comments that are homophobic, transphobic, racist, sexist, anti-religious, or ableist will be removed. “Ironic” prejudice is just prejudiced.
Posts and comments must abide by the lemmy.world terms of service UPDATED AS OF OCTOBER 19 2025
Rule 5: Keep it civil. It's OK to say the subject of an article is behaving like a (pejorative, pejorative). It's NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
Rule 6: Memes, spam, other low effort posting, reposts, misinformation, advocating violence, off-topic, trolling, offensive, regarding the moderators or meta in content may be removed at any time.
Rule 7: We didn't USED to need a rule about how many posts one could make in a day, then someone posted NINETEEN articles in a single day. Not comments, FULL ARTICLES. If you're posting more than say, 10 or so, consider going outside and touching grass. We reserve the right to limit over-posting so a single user does not dominate the front page.
We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.
All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.
News !news@lemmy.world
Politics !politics@lemmy.world
World Politics !globalpolitics@lemmy.world
For Firefox users, there is media bias / propaganda / fact check plugin.
https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/
Luckily for me my password is ******
Edit: weird lemmy automatically replaced my password with '*'
Huh, let me try: hunter2
It really works! I only see ******* !
Classic
Got 'em!
The second most popular, “123456”, is also unlikely to keep hackers at bay.
That's what I use on my luggage
You should enable MFA on your luggage
You know you say that more than likely in jest....
But that's honestly not a terrible idea.
No, it is a terrible idea. The lock is not the weak point on the luggage, it's the zipper.
That's very true! That zipper makes a great case for hard luggage that clamps closed.
Pelican I think makes really good luggage but with pelican comes the cost.
Overall I think the weakest part of luggage is its unusually high liklihood of attack by state adversaries. :p
6 digits for luggage?
12345 was made popular by a documentary several years ago. So I updated my luggage.
/s
It's a reference to Spaceballs if you were out of the loop.
I was out of the loop, thanks for the clarification.
Don't use shit passwords. Don't reuse passwords. Get a password manager. Use 2fa.
Use mfa not 2fa
The more factors, the less secure. Each one you add is another potential exploitable authentication method. It’s only as secure as the least secure MFA method you add.
I mean, how many factors do you advocate for? Two is generally plenty as long as they are good ones.
E.g a passphrase protected ssh key is solid. Similarly protected passkey is good. A TOTP with password is... Not terrible I suppose... SMS would be pretty bad...
Online or offline password manager?
Either or as long as theyre stored encrypted and decrypted on device.
Picked up a keyboard at the thrift with a pink sticky note on the bottom:
user:admin
pass:password
Yes, someone had to write that down.
I'm their defense sometimes you have to be reminded that something that terrible was used
I've "hacked" web apps by logging in with "user - password" or something equally inane.
But, my long-time sole password of TrustNo1 should be good right??
Correct Horse Battery Staple
Invent your own hashing algorithm. It’s easy, fool-proof, secure, and reusable without compromising security.
Here’s a few examples: ebay.com password is moc.y4b3-saltyboi69 lemmy.world password is dlr0w.ymm3l-saltyboi69
(These aren’t real btw)
people writing password crackers are smarter than that dude
Most compromised passwords are used by script kiddies in mass attacks, not targeted attacks by elite hacking squads. If a password fails verbatim, they just move on to the next compromised account of millions, not develop pattern recognition software to try to figure out replacement candidates for each website.
Association attacks exist in the wild.
Let's say that this is their ebay account. In that case the reward for unlocking each account is very high, so attackers (even in mass attacks) have incentive to put in more work as long as the work cost per account hacked is less than the average reward and there is a net profit.
I assume in this day and age it's probably also viable to use LLMs for password guessing, as long as it's for a high value account. That unlocks a whole another can of worms and if it was me I'd never use low entropy passwords like "moc.y4b3-saltyboi69"
Perhaps this kind of password is viable if it's for an online service that implements rate limiting, but you also have to consider the case that a site gets hacked and their encrypted database (encrypted by each user's password) makes it onto the web. This has happened a lot recently and makes it ridiculously easy for people to throw their GPUs at the task.
You sound pretty unqualified to judge smartness.