Use the “passwords” feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They’ll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

  • BombOmOm@lemmy.world
    link
    fedilink
    English
    arrow-up
    179
    ·
    4 days ago

    Protip for the room: Use a password manager with a unique password for every service. Then when one leaks, it only affects that singular service, not large swaths of your digital life.

    • blazeknave@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      3 days ago

      Also, length is most of what matters. A full length sentence in lowercase with easy to type finger/key flow for pw manager master, and don’t know a single other password. Can someone correct me if I’m wrong?

      • Vigge93@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        3 days ago

        I’ve found that there are a handful of passwords that you need to remember, the rest can go in the password manager. This includes the password for the password manager, of course, but also passwords for your computer/phone (since you need to log in before you can access the password manager), and your email (to be able to recover your password for the password manager).

        You are also correct that length is mostly what matters, but also throwing in a random capitalization, a number or two, and some special character will greatly increase the required search space. Also using uncommon words, or words in other languages than english can also greatly increase the resistance to dictionary attacks.

        • Jakule17@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 days ago

          throwing in a special character

          Okay, but hackers don’t have to know whether I used special character or just lowercase? Or am I stoopid?

      • slumberlust@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 days ago

        As always, the most secure password is the least convenient and accessible. It’s a trade off, but you want fewer dictionary words and patterns overall. Preferably with a physical component for the master password.

        Longer is better…giggitty.

    • Weslee@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      2
      ·
      3 days ago

      I use a “password pattern”, rather than remembering all the passwords, I just remember a rule I have for how passwords are done, there are some numbers and letters that change depending on what the service is so every password is unique and I can easily remember all of them as long as I remember the rules I put in place

    • sobchak@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      edit-2
      3 days ago

      I was thinking about this earlier. The password manager browser plugin I use (Proton Pass) defaults to staying unlocked for the entire browser session. If someone physically gained access to my PC while my password manager was unlocked, they’d be able to access absolutely every password I have. I changed the behavior to auto-lock and ask for a 6-digit PIN, but I’m guessing it wouldn’t take an impractical amount of time to brute-force a 6-digit PIN.

      Before I started use a password manager, I’d use maybe 3-4 passwords for different “risks,” (bank, email, shopping, stupid shit that made me sign up, etc). Not really sure if a password manager is better (guess it depends on the “threat” you’re worried about).

      Edit: Also on my phone, it just unlocks with a fingerprint, and I think law enforcement are allowed to force you to biometrically unlock stuff (or can unlock with fingerprints they have on file).

      • gian
        link
        fedilink
        English
        arrow-up
        6
        ·
        3 days ago

        If someone can gain physical access to your PC you are done anyway, he van simply copy the file or do whatwver he want

      • Godort@lemmy.ca
        link
        fedilink
        English
        arrow-up
        26
        ·
        4 days ago

        I assure you, the rare security issues for password managers are far preferable to managing compromises every couple weeks.

        • Kyrgizion@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          4 days ago

          I’ve only really been in one breach. This one is actually a breach of a “security firm” (incompetent idiots) who aggregated login data from the dark web themselves, essentially doing the blackhats’ work for them.

          This is also EXACTLY why requiring online interactions to be verified with government ID is a terrible idea. Hackers will similarly be able to gain all possible wanted data in a single location. It’s simply too tempting of a target not to shoot for.

          • Darkassassin07@lemmy.ca
            link
            fedilink
            English
            arrow-up
            10
            ·
            4 days ago

            I currently have 110 unique user+password combos. I wouldn’t want to change all those even once, if I were breached and had used similar credentials everywhere.

            Bitwarden keeps them well managed, synced between devices, and allows me to check the whole database for matches/breaches via haveibeenpwned integration. Plus because I prefer to keep things in-house as much as possible, I even self-host the server with vaultwarden walled off behind my own vpn, instead of using the public servers. (this also means it’s free, instead of a paid service)

      • Joeffect@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        4 days ago

        Don’t download shit from random websites… make sure its from legit places…

        • tburkhol@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          4 days ago

          legit places…

          My university, 23andMe, Transunion, Equifax, CapitalOne, United Healthcare…

        • Kyrgizion@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          4 days ago

          These kinds of breaches are at the site level. Not much you can do as a regular user if the company doesn’t hash or salt their passwords, for example.

          • Joeffect@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            4 days ago

            Not from what the article says

            involves compromised download links and trojanized versions of the legitimate KeePass application that appear identical to the authentic software on the surface, while harboring dangerous capabilities beneath.

      • floofloof@lemmy.ca
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        4 days ago

        A password manager is still a good idea, but you have to not use a hacked one. So only download from official sites and repositories. Run everything you download through VirusTotal and your machine’s antivirus if you have one. If it’s a Windows installer check it is properly signed (Windows should warn you if not). Otherwise (or in addition) check installer signatures with GPG. If there’s no signature, check the SHA256 OR SHA512 hash against the one published on the official site. Never follow a link in an email, but always go directly to the official website instead. Be especially careful with these precautions when downloading something critical like a password manager.

        Doing these things will at least reduce your risk of installing compromised software.