It is truly upsetting to see how few people use password managers. I have witnessed people who always use the same password (and even tell me what it is), people who try to login to accounts but constantly can’t remember which credentials they used, people who store all of their passwords on a text file on their desktop, people who use a password manager but store the master password on Discord, entire tech sectors in companies locked to LastPass, and so much more. One person even told me they were upset that websites wouldn’t tell you password requirements after you create your account, and so they screenshot the requirements every time so they could remember which characters to add to their reused password.

Use a password manager. Whatever solution you think you can come up with is most likely not secure. Computers store a lot of temporary files in places you might not even know how to check, so don’t just stick it in a text file. Use a properly made password manager, such as Bitwarden or KeePassXC. They’re not going to steal your passwords. Store your master password in a safe place or use a passphrase that you can remember. Even using your browser’s password storage is better than nothing. Don’t reuse passwords, use long randomly generated ones.

It’s free, it’s convenient, it takes a few minutes to set up, and its a massive boost in security. No needing to remember passwords. No needing to come up with new passwords. No manually typing passwords. I know I’m preaching to the choir, but if even one of you decides to use a password manager after this then it’s an easy win.

Please, don’t wait. If you aren’t using a password manager right now, take a few minutes. You’ll thank yourself later.

  • Crikeste@lemm.ee
    link
    fedilink
    arrow-up
    3
    ·
    3 months ago

    It’s also a protection against people who get their hands on your credentials though. You don’t really have any control over a server with your data on it getting compromised, right?

    • JubilantJaguar@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      3 months ago

      If the password is unique, there’s no risk!

      Incidentally: not re-using passwords should be the only responsibility of the user. It’s impossible to brute-force a password through a login form, you need full access to the disk. So when sites complain about poor password strength, effectively they are saying “We don’t trust ourselves to keep our server safe”. Pretty insulting to blame the user for that.

      • Crikeste@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        3 months ago

        Hmm. Maybe I’m misunderstanding something fundamental about cyber security, but wouldn’t a server leak give you login credentials regardless of the uniqueness or amount of use a password has? And 2FA would still protect against that?

        I might have thrown my hat into a ring I have no place in lmao

        • EuroNutellaMan@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          3 months ago

          Unless the website is handled by complete morons it stores credentials in an hashed format. Usually to crack this we’d use rainbow tables or wordlists of known passwords, and essentially we use every word to generate the hash until it matches.

          If your password is strong and hasn’t been compromised (check regularly on haveibeenpwned) it will likely not be in any wordlists and it also won’t be easy to crack. Now, password managers can generate the best passwords because they’re completely random and very long by default so to crack them you’d have to try every possible character combination, this takes time, and specifically a time so long that statistically the andromeda galaxy and milky way will merge into one before the password is cracked (at least until quantum computers become a thing, then it’s mere minutes).

          2FA helps because even if they crack the password they then need the 2FA code, which you can’t really guess or brute force and is seen on a third party app you don’t control (unless you use sms, they can spoof SIMs ro view the sms you receive and therefore degeat 2FA). It also doubles as something that alerts you that someone is trying to access your account.

          • JubilantJaguar@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            3 months ago

            Yes this clarifies things. In summary, without 2FA:

            • use a strong password unique to that site (i.e., via a credentials manager) - safe except on that site if absolute morons are running it
            • use a weak password unique to that site - safe elsewhere
            • use weak passwords and recycle them - you are in trouble

            So it’s a trade-off. If everyone was in the first category, then the obvious inconvenience of 2FA would just not be worth the benefit.

            • EuroNutellaMan@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              3 months ago

              Absolutely not. You should always use 2FA. Most decent password managers even make it easy for you.

              While cracking a strong password is nigh impossible rn they are still vulnerable to data breaches and pass-the-hash attacks.

              • JubilantJaguar@lemmy.world
                link
                fedilink
                arrow-up
                1
                ·
                3 months ago

                Literally “always”, like every single time you open a website or app? No password manager can make SMS 2FA not a PITA. As for your second point, I addressed that. What if you literally don’t care about keeping data in question private? Individuals have different threat models, different priorities and all of this is a trade-off. It’s not absolute. That’s all I was saying. Anyway, I’m done here.

                • EuroNutellaMan@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  edit-2
                  3 months ago

                  2FA should always be enabled. Doesn’t mean you always have to log out of a website. It’s a massive important security feature: it saves your ass if your passwords are leaked/cracked/bypassed and it warns you that someone is trying to access your account. Apps like ProtonPass literally make it extremely trivial to fill it in, just push the button that pops up and it will autofill the 6 digit code (or copy it to your clipboard in the worst case), it’s not SMS 2FA, so you’re frankly stupid for not using it if you have that option.

                  You didn’t address shit, strong passwords will still be vulnerable to certain attacks even if everyone used them. This isn’t a privacy matter either it’s a security one and regardless of what your threat model is 2FA should always be part of your security, there’s a reason more and more websites and apps are pushing it, cause if you don’t force idiots to adopt it they won’t even if it’s extremely important, same reason as why we need rules to make passwords more complicated. It may be an inconvenience (very tragic for the user I know, how dare they make something that autofills and takes a few seconds of my day away from watching useful shit like brainrot and some dumb comments on my favorite social media platform) but it’s an extremely important and necessary measure.