I’m aware of what constitutes a decent password, but typing in 15-30 random characters each time I lock my computer screen is starting to get a bit taxing.

How secure does my user password really need to be and what are the threats to it? Does the same apply to a root-enabled user as a “regular” user when it comes to password security?

For context, my threat model doesn’t need to account for real people breaking in and accessing my computer, the damage would be very contained.

Bonus question - what are the risks of having a weak password on a root user on a spare laptop on the same network as my main device that is used exclusively for web browsing? Thanks.

  • @middlemanSI
    link
    26
    edit-2
    27 days ago

    This is an interesting table for password cracking based on password hash…

    • @[email protected]
      link
      fedilink
      17
      edit-2
      27 days ago

      I was wondering why 1 year was in the red category, but then I realized that that time could decrease quite a bit over time with technological advances

      EDIT: typo

      • @[email protected]
        link
        fedilink
        1227 days ago

        The chart also doesn’t specify what hardware the calculation is based on. If it’s “1 year to crack for your average desktop PC”, then a server farm will do so in minutes.

    • Possibly linux
      link
      fedilink
      English
      326 days ago

      The hash doesn’t matter from a device perspective. The OS enforces a retry delay and a person would need to use a keyboard.

    • Caveman
      link
      226 days ago

      This is for random characters but “interestingpassword” will get cracked by a dictionary attack almost instantly.