This doesn't make sense. People trying to crack passwords don't spend ages researching you and what you like. They try and crack your password by trying as many attempts as possible, so that password will be strong simply based on the fact that they would have to try millions of addresses in order to get to that password.
That's not a brute force attack.
What if you get a hold of a leaked database, then presumably you could brute force the password to a specific user, which may give you access to that account if they haven't changed it, or expose a password pattern that they use to allow you access to other accounts.
Those "Where did you go to school" and "Mother's Maiden Name" security questions? I hate them. Lie, always lie!
I always assumed it was some government initiative to make gaining entry to people's accounts 1000x easier for themMy information is all fake when it comes to that stuff. That kind of security shouldn't be used. Remember MSN Messenger password resets? It was exactly that. Guessable information.
What if you get a hold of a leaked database, then presumably you could brute force the password to a specific user, which may give you access to that account if they haven't changed it, or expose a password pattern that they use to allow you access to other accounts.
The key difference is that, in simple terms, a brute force attack involves trying every possible combination while a dictionary attack involves having a list of words to try. How can you possibly consider going through a finite, non-complete, leaked list of passwords (aka a dictionary) be anything other than the latter?
So I'm a little confused about the new claim that 4 dictionary words isn't as strong as the XKCD comic makes out, I was under the impression that pass phrases like that were the way to go these days. It actually makes sense that it could get cracked relatively easily using a dictionary word combination attack though I suppose.
1- Yep, that XKCD comic is woefully out of date, and it makes me chuckle everytime it's used. It uses an extremely naive (or "pure" if you prefer) viewpoint on password strength but that is often an issue with mathematicians such as with XKCD's author. More info here: https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html
In fairness that does depend on if the cracker is using basic characters or full set. I.E if it's only using basic char set (lower case + upper case + numbers) then 10whitechurchlane will be cracked extremely easily compared to how long it takes a cracker running extended set to crack 1@£hUb833_10whitechurchlane takes longer to crack than 1@£hUb833_
17 trillion years vs 6 years
People who hate 2fa?Who cares what the password is if you have 2 factor auth?
Arbitrary password schemes annoy me.
At work we use a single sign on system, so the password requires that you must have a capital, a symbol, a number (fairly standard) but it must begin and end with a letter. Everyone I've spoke to gets around this by chucking an "a" at the end of whichever password they've chosen. When the 90 day refresh rolls around they just change "a" to "b" and keep the same password
NatWest trials fingerprint debit cards to remove £30 limit
https://www.theguardian.com/money/2...s-fingerprint-debit-cards-to-remove-30-limit?