Know the rules The Paceline Forum Builder's Spotlight


Go Back   The Paceline Forum > General Discussion

Reply
 
Thread Tools Display Modes
  #1  
Old 04-21-2024, 09:25 AM
NYCfixie NYCfixie is offline
Senior Member
 
Join Date: Dec 2015
Location: 10065
Posts: 942
Quote:
Originally Posted by C40_guy View Post
So...lets say I need to log on to an airline site at a hotel using their computer...pw manager won't help me there...
This is about as safe as using a "glory hole" for your sexual needs.

I would never use a public computer for any of my password protected accounts. I would never put personal information on a personal computer.
Reply With Quote
  #2  
Old 04-19-2024, 03:19 PM
slowpoke slowpoke is offline
Senior Member
 
Join Date: Jun 2010
Location: San Francisco, CA
Posts: 1,561
Quote:
Originally Posted by C40_guy View Post
Easy. Nine common letters plus four unique ones relevant to specific use...

i.e. Poopystuffebay# for ebay sign-on, Poopystuffamaz# for Amazon sign-on...
Except when one site leaks your unecrypted passwords, now people who want to target you know your general algorithm. E.g. Poopystuffpace# or Poopstuffpaceline#

Just use a password manager and generate unique passwords for each site. DIY spreadsheet or physical notebook can work, but you then need to sync it across multiple devices for backups et cetera.

Your three most likely mistakes you'll make online are probably:
- entering your credentials on a very believable phishing site
- having one of the many sites that you've reused your passwords leak that password
- buying stuff you don't need on Paceline
Reply With Quote
  #3  
Old 04-19-2024, 03:23 PM
slowpoke slowpoke is offline
Senior Member
 
Join Date: Jun 2010
Location: San Francisco, CA
Posts: 1,561
I love this forum and all, but if there's one place I worry about a leak, it would be here. We're running on super outdated software.

So make sure your Paceline password is different from any other site.
Reply With Quote
  #4  
Old 04-19-2024, 05:08 PM
Louis Louis is offline
Boeuf Chane
 
Join Date: Dec 2003
Location: St. Louis MO
Posts: 25,498
Quote:
Originally Posted by slowpoke View Post
So make sure your Paceline password is different from any other site.
What % of PL users (say, those who visit the forum at least once a week) do you think use the PL password elsewhere too?

I sure hope that's a low, low number, because doing so would be truly foolish, especially if that pw is used for anything remotely important.
Reply With Quote
  #5  
Old 04-20-2024, 07:41 AM
C40_guy's Avatar
C40_guy C40_guy is offline
Senior Member
 
Join Date: Aug 2008
Location: New England
Posts: 6,003
Quote:
Originally Posted by slowpoke View Post
Except when one site leaks your unecrypted passwords, now people who want to target you know your general algorithm. E.g. Poopystuffpace# or Poopstuffpaceline#
Most criminals aren't that smart, and they'd probably need more than one to figure out the pattern.

If criminals start using big data and AI to figure this out, it's game over anyway. Might as well just leave my wallet on the driveway.
__________________
Colnagi
Seven
Sampson
Hot Tubes
LiteSpeed
SpeshFatboy
Reply With Quote
  #6  
Old 04-20-2024, 10:08 AM
rkhatibi rkhatibi is offline
Senior Member
 
Join Date: Aug 2014
Location: SF, CA
Posts: 274
Quote:
Originally Posted by C40_guy View Post
Most criminals aren't that smart, and they'd probably need more than one to figure out the pattern.

If criminals start using big data and AI to figure this out, it's game over anyway. Might as well just leave my wallet on the driveway.
I have some unfortunate news for you.
"Credential stuffing is the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts. This is a subset of the brute force attack category: large numbers of spilled credentials are automatically entered into websites until they are potentially matched to an existing account, which the attacker can then hijack for their own purposes."

People tend to think of attacks like this as directly targeting them. Everyone is being targeting. You only lose if your online behavior, weak password or password reuse even partials, is susceptible to these attacks.
Reply With Quote
  #7  
Old 04-19-2024, 10:43 AM
fmradio516 fmradio516 is offline
Senior Member
 
Join Date: May 2010
Location: Long Island, NY
Posts: 4,568
Quote:
Originally Posted by gravelreformist View Post
And if it did, I would simply have to reset a lot of passwords. Irritating but not the end of the world.
I think the other poster meant like, what if the password manager service is down.

One option is to keep a second app that isnt web-based, like KeePass, which stores all your passwords on an encrypted database on your device. So if your regular web-based service goes down, youre not without your passwords. Only pain would be having to manually sync passwords that you add or change to KeePass, but im sure theres a way to sync it automatically...
Reply With Quote
  #8  
Old 04-19-2024, 10:46 AM
NYCfixie NYCfixie is offline
Senior Member
 
Join Date: Dec 2015
Location: 10065
Posts: 942
I work in Cybersecurity as well and what I tell friends/family/co-workers is:
- Use a password manager
- Have it create and store the passwords for you (15 characters minimum but the more the better)
- DO NOT use the same password for multiple accounts/services
- Make sure ALL accounts/services are setup for multi-factor authentication
- Your email password should be the STRONGEST password
(because if hackers can into your email they can often reset passwords for all other accounts/services since most people do not use multi-factor authentication)
- Your password manager should have your second strongest password
- Write your eMail and Password Manger passwords on an index card (yes, I mean paper) and store them safely some place in your home. DO NOT save them anywhere else.


Many commercial password managers can be (or have been) broken. Nothing is perfect. The safest method is to keep everything on paper, locked away at home, and never share with anyone.

Multi-factor authentication is not perfect. Hackers have found interesting ways to get around it (i.e. they can clone your mobile number to receive the multi-factor code you need to authorize yourself to a system after entering the password they have been able to figure out or steal from you).

The point is, most hackers are lazy so if you use a few different methods to protect yourself, hackers will move on and try to terrorize another person who may not have safeguards in place.

Be careful out there.
Reply With Quote
  #9  
Old 04-19-2024, 04:22 PM
kingpin75s kingpin75s is offline
Senior Member
 
Join Date: Mar 2013
Location: Mpls, MN
Posts: 1,572
Quote:
Originally Posted by NYCfixie View Post
I work in Cybersecurity as well and what I tell friends/family/co-workers is:
- Use a password manager
- Have it create and store the passwords for you (15 characters minimum but the more the better)
- DO NOT use the same password for multiple accounts/services
- Make sure ALL accounts/services are setup for multi-factor authentication
- Your email password should be the STRONGEST password
(because if hackers can into your email they can often reset passwords for all other accounts/services since most people do not use multi-factor authentication)
- Your password manager should have your second strongest password
- Write your eMail and Password Manger passwords on an index card (yes, I mean paper) and store them safely some place in your home. DO NOT save them anywhere else.


Many commercial password managers can be (or have been) broken. Nothing is perfect. The safest method is to keep everything on paper, locked away at home, and never share with anyone.

Multi-factor authentication is not perfect. Hackers have found interesting ways to get around it (i.e. they can clone your mobile number to receive the multi-factor code you need to authorize yourself to a system after entering the password they have been able to figure out or steal from you).

The point is, most hackers are lazy so if you use a few different methods to protect yourself, hackers will move on and try to terrorize another person who may not have safeguards in place.

Be careful out there.
This all looks like pretty good stuff. Had to see what advice was being given here as NIST guidance was wrong up until about 6 years ago. I had to stonewall auditors for years until guidance finally matched real world experience. Frequent password change requirements of the past have always only lead to bad behavior. Length is key and complexity is secondary. 14 or more chars in my book.
Reply With Quote
  #10  
Old 04-20-2024, 10:32 AM
fourflys's Avatar
fourflys fourflys is offline
Back At It!
 
Join Date: May 2008
Location: Sonoma County, CA
Posts: 7,626
any recs for a password manager from someone in the industry?

Quote:
Originally Posted by NYCfixie View Post
I work in Cybersecurity as well and what I tell friends/family/co-workers is:
- Use a password manager
- Have it create and store the passwords for you (15 characters minimum but the more the better)
- DO NOT use the same password for multiple accounts/services
- Make sure ALL accounts/services are setup for multi-factor authentication
- Your email password should be the STRONGEST password
(because if hackers can into your email they can often reset passwords for all other accounts/services since most people do not use multi-factor authentication)
- Your password manager should have your second strongest password
- Write your eMail and Password Manger passwords on an index card (yes, I mean paper) and store them safely some place in your home. DO NOT save them anywhere else.


Many commercial password managers can be (or have been) broken. Nothing is perfect. The safest method is to keep everything on paper, locked away at home, and never share with anyone.

Multi-factor authentication is not perfect. Hackers have found interesting ways to get around it (i.e. they can clone your mobile number to receive the multi-factor code you need to authorize yourself to a system after entering the password they have been able to figure out or steal from you).

The point is, most hackers are lazy so if you use a few different methods to protect yourself, hackers will move on and try to terrorize another person who may not have safeguards in place.

Be careful out there.
__________________
Be the Reason Others Succeed
Reply With Quote
  #11  
Old 04-20-2024, 10:39 AM
benb benb is offline
Senior Member
 
Join Date: Apr 2007
Location: Eastern MA
Posts: 9,969
Any good system shouldn’t be particularly vulnerable to credential stuffing and brute force attacks. It should detect that and insert delays or completely reject the requests after a small number of guesses.

Those attacks work well if the hacker has already breached the system and dumped databases and the database is storing passwords in a poor or well known way.

“Capture the password file” is a great first step in any kind of breach so of course a look work goes into making that hard.
Reply With Quote
  #12  
Old 04-20-2024, 02:45 PM
VeloceNiente VeloceNiente is offline
Member
 
Join Date: Nov 2023
Posts: 38
Just wanted to reiterate what has been said (and is just as important as using strong passwords):

Use different passwords on every account.

Last edited by VeloceNiente; 04-20-2024 at 04:04 PM.
Reply With Quote
  #13  
Old 04-20-2024, 04:03 PM
Louis Louis is offline
Boeuf Chane
 
Join Date: Dec 2003
Location: St. Louis MO
Posts: 25,498
Quote:
Originally Posted by VeloceNiente View Post
Use different passwords on every login.
You must mean every account. Every login would be nuts.
Reply With Quote
  #14  
Old 04-20-2024, 04:07 PM
VeloceNiente VeloceNiente is offline
Member
 
Join Date: Nov 2023
Posts: 38
Quote:
Originally Posted by Louis View Post
You must mean every account. Every login would be nuts.
I meant the noun form of ‘login’, but ‘account’ is clearer. Edited.
Reply With Quote
  #15  
Old 04-20-2024, 05:01 PM
fourflys's Avatar
fourflys fourflys is offline
Back At It!
 
Join Date: May 2008
Location: Sonoma County, CA
Posts: 7,626
funny enough, after reading this thread I went and changed my BoA credit card password to a random one from the Apple/Chrome extension password generator.. went for a ride, came back and just got a text that my card had a charge that had been declined for suspicious activity.. coincidence I'm sure, but just a little funny.. went through the process to get two charges taken off and and new card and changed my password once again.. I assume it was from a skimmer or something similar and not an account hack..
__________________
Be the Reason Others Succeed
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 06:13 AM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.