• @Buffalox
    link
    English
    01 day ago

    Your own system is probably worse than what password managers do.

    How so? If you use a password manager across 3 platforms, that makes for 3 attack vectors.
    My personal system has guaranteed no vulnerabilities. So how do you conclude my system is worse?

    • @[email protected]
      link
      fedilink
      English
      01 day ago

      My personal system has guaranteed no vulnerabilities

      If you think that’s true, then you don’t have the experience to make a secure system.

      • @Buffalox
        link
        English
        01 day ago

        What? What kind of system do you think I have? The only vulnerability is if they can hack my brain.

        • @[email protected]
          link
          fedilink
          English
          020 hours ago

          Yeah, that’s going to be a terrible system. The human brain isn’t capable of keeping track of enough entropy to create a secure password system.

          More generally, it’s a big red flag when anybody thinks they can make a better system than publicly available and verified systems. You’re not capable of that, I’m not capable of that, Bruce Schneier is not capable of that. No matter how smart you are, you missed something. That’s why I didn’t need to know a single detail.

          • @Buffalox
            link
            English
            0
            edit-2
            7 hours ago

            he human brain isn’t capable of keeping track of enough entropy to create a secure password system.

            What an idiotic argument, the level of entropy comes from the rules first and foremost, putting a 1 and an A together is the exact same entropy as using 2 and B. Randomizing it one way instead of another doesn’t change entropy much.

            More generally, it’s a big red flag when anybody thinks they can make a better system than publicly available and verified systems.

            You completely fail to understand the argument. I’m not arguing my passwords are stronger, I’m arguing they are SAFER! because they are not stored on any system, much less 3 different systems, one of which could theoretically have a vulnerability.

            • @[email protected]
              link
              fedilink
              English
              17 hours ago

              What an idiotic argument, the level of entropy comes from the rules first and foremost, putting a 1 and an A together is the exact same entropy as using 2 and B.

              Oh dear, no. You cannot match a cryptographic (P)RNG for generating passwords. Not even close.

              • @Buffalox
                link
                English
                17 hours ago

                True, my argument is that in practice it doesn’t matter. How many passwords of REASONABLE strength are brute forced? Opposed to how many are lifted from services with lacking security?

                • @[email protected]
                  link
                  fedilink
                  English
                  17 hours ago

                  Quite a few. Data dumps of passwords from sites can be from sites that used full hashing. If you used a fully random password of at least 20 characters, even unsalted md5 storage would be unbreakable.

                  • @Buffalox
                    link
                    English
                    17 hours ago

                    That’s true. But how does a randomized password generated by a password manager work when the service is accessed from 3 platforms? Like for instance Windows, Linux and Android?
                    Seems to me that you need 3 different pieces of software, and just 1 getting compromised would compromise everything.