How much bits of entropy is required minimum to be uncrackable in 2023?

How much bits of entropy is required minimum to be uncrackable in 2023?

  1. 3 weeks ago
    Anonymous

    is it really an issue if the service requires 2FA?

    • 3 weeks ago
      Anonymous

      2FA is just an excuse for every single company to have your phone number in the event the feds need to track you down.

      • 3 weeks ago
        Anonymous

        Or just do this like a nonretard
        https://www.linux.org/threads/in-depth-tutorial-how-to-set-up-2fa-totp-with-keepassxc-aegis-and-authy.36577/

      • 3 weeks ago
        Anonymous
      • 3 weeks ago
        Anonymous

        ...Or you can set up your mail to receive the 2FA you dumb dumb.

        • 3 weeks ago
          Anonymous

          most woke shit doesnt allow free emails. I cant send a cock li email to anyone with a standard email account. it doesnt even show up in spam.

          • 3 weeks ago
            Anonymous

            >I cant send a cock li email to anyone with a standard email account. it doesnt even show up in spam.
            How's that?

      • 3 weeks ago
        Anonymous

        SMS is widely known to be the least secure method of 2FA. Real niggas use a FOSS authenticator app & back up their OTPs regularly.

    • 3 weeks ago
      Anonymous

      2FA is just an excuse for every single company to have your phone number in the event the feds need to track you down.

      Or just do this like a nonretard
      https://www.linux.org/threads/in-depth-tutorial-how-to-set-up-2fa-totp-with-keepassxc-aegis-and-authy.36577/

      very ambiguous, it depends very much on the encryption that the server uses to encrypt the user's password.

      If the server does not encrypt the password, up to INT_MAX characters is instantaneous.

      That chart doesn't even make sense. Is brute force against a server? What server would allow an infinite amount of unsuccessful login attempts in such a short time?

      2FA? Which server with even the slightest capability to integrate 2FA would not be able to handle a simple brute force?

      • 3 weeks ago
        Anonymous

        >What server would allow an infinite amount of unsuccessful login attempts in such a short time?
        Loads of servers do, sadly.

        • 3 weeks ago
          Anonymous

          And why would anyone in their right mind keep such a confidential password in a poor service?

          • 3 weeks ago
            Anonymous

            They don't advertise they're a shit service so you don't know until after it's compromised

    • 3 weeks ago
      Anonymous

      I'll say more, it's a non-issue if the service has a wrong password cooldown.

  2. 3 weeks ago
    Anonymous

    very ambiguous, it depends very much on the encryption that the server uses to encrypt the user's password.

    If the server does not encrypt the password, up to INT_MAX characters is instantaneous.

  3. 3 weeks ago
    Anonymous

    Use a fucking nonsensical long phrase. Easy to remember for humans difficult to try for computer.
    Those security guides proposes password that are difficult to the human but easy to the machine

    • 3 weeks ago
      Anonymous

      Brute force programs can do phrases now.
      Stick to

      20+ randomised characters, including numbers, letters and special characters.

      Each password should be different from the last - completely different.

      • 3 weeks ago
        Anonymous

        you can do more randomized words, it would be way more difficult for a dictionary attack and would be always easier to remember
        this

        passwords are dead, passphrases are better

        but longer, and maybe add a question and an answeror talk about numbers
        like:
        How did Alex go? He ride a rock, at 18km/h underwater.
        53ch, 220bits, or 11 words with 3 caps, 2 numbers and 3 special characters. How difficult it would be for an dictionary attack to crunch?
        You can change letters for numbers or other shit like random caps for extra security. Or don't use grammar at all

        • 3 weeks ago
          Anonymous

          You want to avoid using sentences at all ubless you want to type a parageaph. The whole point of diceware is thats it's random and the math checks out even if the attacker knows you dictionary list
          Instead just mix in foreign words(romanized chinese) or better yet obscure fantasy/sci-fi words

          • 3 weeks ago
            Anonymous

            i was simplifying.
            I mix several of the languages i know, and i take care that i use the non english characters as much as possible.
            Then again we shouldn't care that much unless, we as individuals are interesting targets or normies get close to our safety levels.
            If 95% of passwords can be bruteforced in like 30mins and yours take 10 hours, you'll probably safe. This is real life, your house doesn't need to be supersafe, it just needs to look more difficult to steal than your neighbors

  4. 3 weeks ago
    Anonymous

    20+ randomised characters, including numbers, letters and special characters.

    Each password should be different from the last - completely different.

    • 3 weeks ago
      Anonymous

      passwords are dead, passphrases are better

      • 3 weeks ago
        Anonymous

        Thats is like 30 years old, 44 bits of entropy is not nearly enough
        Any script kiddy with gaming pc could crack that

        • 3 weeks ago
          Anonymous

          yeah no shit. But it's an example

          • 3 weeks ago
            Anonymous

            passwords are dead, passphrases are better

      • 3 weeks ago
        Anonymous

        >Dictionary attack
        >"Yeah mate just write a short story for every site you use"
        Also sites like paypal allow a max of 20 chars

        • 3 weeks ago
          Anonymous

          >max 20 chars
          Do e-paynaggers really?

        • 3 weeks ago
          Anonymous

          I protect myself from dictionary attacks by using a funny typo of a japanese untranslated Visual Novel game character that I like in my passphrase. Don't think any dictionary will contain that.

          • 3 weeks ago
            Anonymous

            a lot of cracking dictionaries are built from actual password databases. If you've used it on a site that had a leak, and it wasn't properly salted, it could be in a database.

  5. 3 weeks ago
    Anonymous

    >all these posts
    >still no xkcd

    Zoomer hours

  6. 3 weeks ago
    Anonymous

    I always heard that rainbow tables can fuck you up but I never found proof of this.

    • 3 weeks ago
      Anonymous

      if you're cracking a hash, and they're not salted yeah they can fuck you up

    • 3 weeks ago
      Anonymous

      Those are more relevant if your users table gets leaked.

  7. 3 weeks ago
    Anonymous

    Pic related is also relevant.

    • 3 weeks ago
      Anonymous

      >drug him

      this chart was really made by a person without any sense of reality
      people on drugs feel less pain and are more encouraged
      do you think that most armed robbers go to work "sane"? no, most are drugged, precisely to ease the pain of a possible bullet inside his chest

      • 3 weeks ago
        Anonymous

        >he's never heard of truth serum

        • 3 weeks ago
          Anonymous

          Doesn’t even take that. Give him 100mg of molly and ask nicely. Cost: $15

        • 3 weeks ago
          Anonymous

          hes not wrong, you either use drugs OR beat him up, depending if its an important person or not, you dont use both
          t. crime movies are not a reliable source

      • 3 weeks ago
        Anonymous

        name 3 drugs

      • 3 weeks ago
        Anonymous

        just don't pick those drugs. Something to give em paranoia and anxiety like a hallucinogenic.

  8. 3 weeks ago
    Anonymous

    >use a password that's so long it doesn't fit in the attacker's RAM
    checkmate.
    now I'm safe as long as my PC has more ram than other people.

    • 3 weeks ago
      Anonymous

      SWAP is a thing, cuckold.

      • 3 weeks ago
        Anonymous

        >put my page file in Google Drive (5000TB storage)
        checkmate

        • 3 weeks ago
          Anonymous

          How are you going to input the password, pig?

  9. 3 weeks ago
    Anonymous

    Over 9000

  10. 3 weeks ago
    Anonymous
  11. 3 weeks ago
    Anonymous

    It's not just about the password itself but also about the key derivation method. With something like Argon2 the password itself doesn't matter so much.

  12. 3 weeks ago
    Anonymous

    >entropy
    Stop using words that you don't even know what they mean.

  13. 3 weeks ago
    Anonymous

    Its not a matter of being cracked now. Communication and data are not ephemeral.
    They are constantly getting saved.

    Its about being uncrackable in 2123

  14. 3 weeks ago
    Anonymous

    >How hackable is your password
    >Big Tech(github, twitter, select facebook accounts...): Plaintext passwords
    >instantly

    >Encrypted disk
    >wrench
    >instantly

    >Password with hash and salt
    >Hacked personal device
    >instantly

  15. 3 weeks ago
    Anonymous

    did they include PBKDF2 in their calculations?

  16. 3 weeks ago
    Anonymous

    so, that's the time it takes to brute force in a perfect world. but it's almost never that exact situation. any application worth its weight will rate limit you, so the real time is actually much, much longer.

    • 3 weeks ago
      Anonymous

      correct it's offline cracking but don't pretend it doesn't happen, it often does and most companies are still using MD5 or SHA1 for hashes for no good reason

      • 3 weeks ago
        Anonymous

        and that's if you can get a dump of the db. but i mean at that point your application is already beyond gone

        Retard

        explain what i said is retarded

    • 3 weeks ago
      Anonymous

      Retard

Your email address will not be published. Required fields are marked *