doctorow — 2013-12-07T23:11:14-05:00 — #1
singletona082 — 2013-12-07T23:58:01-05:00 — #2
The movie 'Hackers' lied to me.
Secret, Sex, and God aren't on there much less the top three.
patrace — 2013-12-08T00:10:38-05:00 — #3
That's the stupidest combination I’ve ever heard of in my life! That’s the kinda thing an idiot would have on his luggage!
nonfer — 2013-12-08T00:22:17-05:00 — #4
did you notice that chelsea passed secret in popularity?
newliminted — 2013-12-08T00:24:30-05:00 — #5
I use one of the top 20 as a 'password core', but I don't use it in english and I put #'s and symbols around it. Weird that that particular word is so popular.
agonist — 2013-12-08T00:37:50-05:00 — #6
Passwords can say a lot about a person so I always made it a point to never choose a password that I would be embarrassed by in the event I ever needed to share it with someone. I no longer have that concern now that I use a password manager which generates them for me.
ygret — 2013-12-08T03:28:28-05:00 — #7
Some bored psychologists (there seem to be a lot lately judging by the "studies" I'm always reading about) should do a study of people who chose "fuckme" as opposed to "fuckyou".
singletona082 — 2013-12-08T03:45:16-05:00 — #8
Note to self: change luggage combonation.
drplokta — 2013-12-08T03:50:40-05:00 — #9
The list is probably somewhat biassed. One source of passwords is from reversing publicly available lists of password hashes -- but only weak passwords can be obtained in this way, and so weak passwords will be over-represented in the total corpus of known passwords. While a great many people do use "password" as their password, it's probably not actually as high as 4.7%.
raybert — 2013-12-08T11:50:03-05:00 — #10
howard — 2013-12-08T12:06:15-05:00 — #11
We read articles on how to create long, random passwords - reminding us not to write them down, nor repeat them. With people having lots and lots and lots of passwords, I wonder if they really believe creators of password technology understand humans.
doomvox — 2013-12-08T14:09:21-05:00 — #12
But "swordfish" didn't even make the top 10,000!
Kids these days.
shibi_sf — 2013-12-08T14:33:47-05:00 — #13
All password discussions (in my head) begin and end with CORRECTBATTERYHORSESTAPLE.
wrecksdart — 2013-12-08T14:58:09-05:00 — #14
Hey yeah, that's great. Also, your cable bill is late and those emails from your father-in-law...yikes!
wrecksdart — 2013-12-08T15:00:09-05:00 — #15
Absolutely. Also, Chelsea, Jennifer, Hunter and Michael all really need to rethink their computer security policy.
danegeld — 2013-12-08T16:01:19-05:00 — #16
my passwords are generated thusly
cat /dev/urandom | head -n 100 | openssl sha1 | tail -c 41
cpconstantine — 2013-12-08T19:54:59-05:00 — #17
what constitutes a 'weak' password these days is pretty high: Unless you're allowing Unicode passwords, anything less than about 14 characters is crackable remarkably quickly. Graphics cards, not just for making pretty pictures any more!
Also, that unsalted hashes seem to be the exception not the rule, isn't helping the situation much.
When all said and done, the only reasonable solution is never re-use passwords ever.
technogeekagain — 2013-12-08T22:32:26-05:00 — #18
Many (not all) of my passwords come from a specific generating sequence that lets me recover the old ones if I forget to change something. In recent years I started applying additional transformations to further mask what the base sequence is.
samsam — 2013-12-08T22:34:27-05:00 — #19
Well, not so good now that you've pasted it there for everyone to see, eh?
shibi_sf — 2013-12-09T18:06:27-05:00 — #20
I respectfully averted my eyes to avoid seeing that password.
next page →