Disclaimer: I use a password manager, so please don’t direct your comments at me.


So I know this person that says they don’t use a password manager because they have a better system like… I’m gonna give an example:

Lets say, a person loves Star Wars, and their favorite character is Yoda. The favorite Their favorite phrase is from The Good Place “This is the Bad Place!”. And their favorite date is 1969 July 20th (first landing on moon).

So here:

Star Wars Yoda = SWYd

“This is the Bad Place!” = ThIThBaPl!

1969 July 20 —> 69 07 20

So they have this “core” password = SWydThIThBaPl!690720

Then for each website, they add the website’s first and last 2 characters of the name to the front of the password…

So, “Lemmy Forum” = leum

Add this to the beginning of the “core” password it becomes:

leumSWydThIThBaPl!690720

For Protomail Email it’s: prilSWydThIThBaPl!690720

For Amazon Shopping it’s: amngSWydThIThBaPl!690720

Get the idea?

The person says that, since the beginning of the password is unique, its “unhackable”, and that the attacker would need like 3 samples of the password to figure out their system.

Is this person’s “password system” actually secure?

  • F04118F@feddit.nl
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    There’s literally only 4 characters difference between all their passwords, even if those would be completely random, that’s very bad.

    They don’t seem to understand that it’s not about how many samples you need to see to be sure what their Amazon password is. The problem is that if one of their passwords ever leaks, some bot can brute-force try thousands of variations on it and find any other password very quickly (they effectively only have to guess 4 characters, plus a bit to find that it’s the first 4 to change).

    How can anyone think this is more secure than having completely different and long passwords for every site?

    They probably don’t understand that your pw manager’s password is safer because you don’t enter it anywhere, only into your password manager (ideally with 2FA). This person is effectively spreading their master password around by putting it as the core of ALL their passwords, significantly increasing the risk that it leaks.

    • throwawayacc0430@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      2 months ago

      There’s literally only 4 characters difference between all their passwords, even if those would be completely random, that’s very bad.

      So the 4 characters is just my way to explain their system, I don’t actually know how many characters they use in their “unique” part of the password, but the idea is that the unique part of the password is derived from the website.

      • F04118F@feddit.nl
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        Obviously random is better, but uniqueness of passwords is IMO even more important. They are effectively spreading around their master password

  • rottingleaf@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    A phrase is better:

    unlucky friendly monkey got raped by feral donkeys the monkey ran away from donkeys led astray

    It’s not very different from a sequence of 13 symbols, but there are many more words in English lexicon than symbols in ASCII plus 10, and the password becomes easier to memorize.

    This is also an adaptation of a joke from a Russian cyberpunk novel, one of the last good things by its author, called “Labyrinth of reflections”. It’s still very good BTW.

    One my friend has a very good taste in books and poetry, but when you talk to him, you wouldn’t think that. He spews bullshit about “patriotism”, alternative history, “anti-male laws” and such, believes that he can feel energies, and the only way to notice there’s something much better buried underneath is to talk about random life events for long, not trying to fix on anything in particular or reason logically. Yet every book he’s advised has been precious to me.

    • Tiger@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Phrases or words are good, but they should be random - not from known passages in poems, books movies etc, at least not without significant alteration.

  • FriendOfDeSoto@startrek.website
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    I would say this system is safe until one password - through no fault of their own - gets leaked. Worse even, two of them. If a bored hacker sees them in a stolen list, they could go to town on all other accounts. So you should advise your acquaintance to change their system. Long passwords are great but if they repeat a lot of characters they are immediately less useful. If the repeating string is known it makes brute-forcing other accounts that much easier.

    The best advice is to keep unique passwords for all accounts. And by unique I mean not following a system like that. Long, random, non-sensical crap is best (but also most annoying) - for now. Once quantum computers become a thing, all this probably won’t matter any more.

    Edit: And always with non-SMS, non-emailed 2FA. But if those are the only options available it’s better than nothing.

  • JeeBaiChow@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    I used to do this. Have a system for generating a unique password for each site. But then one site got hacked and I had to reset my password, and I couldn’t use the old password. So I had to make a new system. You see the problem.

    • Takapapatapaka@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      A solution to this is to keep adding elements to the chain to create a new password. Like your base password is FavouriteCharacter2025siteletters, and if you need to change it, go for FavouriteCharacter2025siteletters!!!

      If you add the same element across accounts when you need to change a pw, it’s still easy to remember, just a few more try when you forget it, it’s still useful against database leaks, and it’s not worse when it comes to targeted hack.

  • mel ♀@jlai.lu
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    If this person is scared to have password stored, you can talk them about lesspass. It is available as a website where everything happens inside the browser, a browser plugin or an android app and it uses crypto derivation to generate unique passwords for each site.

  • TranslateErr0rs@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    I get the idea as I used to do this too. Having secure & different passwords everywhere is just the basic way to go. As such I dont think though its a good idea to put a system in your passwords. Hacking attempts are automated and getting smarter every day. Its only a matter of time until someone unleashes an AI to look for patterns and you are toast.

    I recommend to juse a decent password manager that generates them for you and as much MFA as possible.

  • zxqwas@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Better than a lot of other methods. What are you protecting, from who and how annoying would it be to recover if it went wrong. I don’t use a password manager because I’d lose the file for sure and it would be just as inconvenient to recover as if someone hacked me. I also don’t have any sensitive stuff. Work on the other hand I have a password manager.

    The lowest hanging fruit is using a leaked/hacked/stolen list of accounts/emails and passwords and trying them on other sites. You should be safe from that.

    If you have sensitive information someone would be willing to break the law and spend a few thousands of dollars to get you’re not safe.

  • Yermaw@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Its secure enough for the average person. If your friend was a big deal, super rich or powerful and a massive target it would be easy enough to figure out.

    I doubt it would be worthwhile trying to crack that particular code for the average joe.

  • BananaTrifleViolin@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    So no this is not safe. Once ypu have a system it is easier to crack because if someone has 2 or more of your passwords they can work out there is a system and it’d make it much easier to crack others if they’re determined.

    It is unlikely that someone random would specifically target a person and systematically try and crack their passwords. If that were to happen it’d most likely he someone they know - and this does happen sometimes. So while the passwords are definitely flawed it may not be something that anyone takes the time to exploit. But you can never say never.

    The best way to manage passwords probably remains a secure password manager and randomly generated series of characters for each site. If its truly random then there are no shortcuts and every single password stands independently. The password manager gets round the issue of memorising them.

  • SkavarSharraddas@gehirneimer.de
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    If you’re using a password on one site you’re trusting that site to keep that password safe, so that only you can access your account.

    If you’re using one password everywhere you’re trusting the weakest site to keep your most important account safe, which is obviously a bad idea.

    Your friend is trusting the weakest sites he uses (or used at any point in the past) to keep his password scheme safe. Not quite as obviously bad, but to me it doesn’t seem to be a particularly good idea either.

  • Liam Mayfair@lemmy.sdf.org
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    That system is vulnerable to social engineering attacks. If hackers found out all their favourite things that lead to the core part of the password, guessing the prefix wouldn’t be that hard. Also, what would your friend do if one of these passwords got compromised and had to change it? Would he just add a 1 to the site-specific part of the password?

      • Tiger@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Hackers aren’t always using the login interface, sometimes they’re beyond that and have access to the database of password hashes, and they’re trying to crack the password that can be entered to match a hash and get to try as many times as they like on their own away from the target system.

      • Liam Mayfair@lemmy.sdf.org
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        Yeah, but there are degrees of vulnerability. Otherwise, things like password strength or MFA wouldn’t matter.

        If all your passwords are fully random, then that’s one less weakness that can be exploited. People can’t make educated guesses about your passwords just from analysing your social media profiles and history, e.g. if you post a lot about Star Wars, it’s more likely your passwords could contain a Star Wars reference.

        • … true. You were clearly talking about how the “root” was constructed. If the root were random, a weakness would still be inherent in having the root exposed means all your accounts are potentially compromised, but social engineering wouldn’t be as much of an issue.

          I skipped over the root generation, as it’s just a useless twist on an older process. “Useless” in that I don’t think it adds any value to construct a root from favorite things. It’s no easier than just memorizing a single 12-character random string and then adding per-site suffixes, which is how I first heard this described a decade ago.

  • dwindling7373@feddit.it
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    So, dedicated enough to embrace the importance of a solid password but not humble enough to think he’s got a better system than what everybody else reccomend.

    The system is clearly flawed ego wise.

    It’s an insafe password + salt.

  • foggy@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    If it is sufficiently long, and the pattern is in any way dynamic then yes.

    If they’re doing something like lemmy-core-420 then no.

    A drummer friend used to do a few bars of a different rudiment. Like djddjdjjdjddjdjjdjddjdjjdjddjdjj and then account for PW rules