• Maharashtra
    link
    English
    11 year ago

    If I were to list devices under my control both at home and at work, it’d come as massive flex, since I work as corporate sysadmin and that’s only my most recent job. So, rather than that, let me just say that if you happen to find such small environment difficult to control, password-wise, you’re approaching the problem wrong.

    Invest in very simple mnemonic solutions (which is just a fancy name for reducing seemingly complex memory tasks to trivialities), learn about patterns and password’s entropy, and do remember, that:

    • Currently (non quantum-computing freely available), @2@JustARegularNerd@2@ is as good password as NDuknn#$83!$%, since they both will take ridiculous amount of time to break raw and an attempt to break it will activate safety procedures in every reasonable online service there is. The former is a trivial thing to remember, since it uses your nickname and @2@ string. Here, you can test both for predicted time to break.
    • Relying on third party software solutions, especially closed-software for security is always risky, no matter what the developer(s) behind it claims, and no matter how professional it looks like. There are leaks and account takeovers all the time, businesses are being sold, or turn out to be run by crooked characters, governments force the “bastions of freedom” to kneel, and they do kneel.