Or using your account to ship drugs.
https://abcnews.go.com/blogs/headlin...-of-pot-inside
Or using your account to ship drugs.
https://abcnews.go.com/blogs/headlin...-of-pot-inside
Per Ardua ad Astra
Don't reuse passwords
Enable MFA
Use a password manager
Brute force attacks are not the big threat. 1.Phishing, 2.Breach data, 3.Password guessing/social engineering
Don't reuse passwords
Enable MFA
Use a password manager
If your post count is higher than your round count, you are a troll.
Password manager like 1Password. There are others but I decided 1Password was the sweet spot for me.
You can also get a "family" subscription if you want to share some passwords with others and keep others to yourself.
Got 1Password about two years ago and haven't looked back.
https://1password.com/
O2
YOU are the first responder. Police, fire and medical are SECOND responders.
When seconds count, the police are mere minutes away...
Gun registration is gun confiscation in slow motion.
My feedback: https://www.ar-15.co/threads/53226-O2HeN2
If some password manager site got hacked they wouldn't get your passwords*. In a nutshell this is how they all work:
When you subscribe to a service, they generate a key and you supply a password. They don't store the password, so rule number 1 is that if you lose your password manager password, there is NO WAY to recover it. Keep this in mind.
The service never sees your passwords. Your unencrypted passwords exist only on your local system. When you save a new username/password, it's added to your local file of username/passwords, that file is encrypted and sent to the service and stored there in an encrypted state.
You need both the key they generated for you at signup AND your password to decrypt the file. So you need to manually install the gawd-awful (in a good way) key on each system you wish to use the password manager on.
So someone needs BOTH your key and password to get to your info. So getting just one - key or password, is useless.
Takeaways:
- The service itself can't decrypt your info, so the service being hacked is useless*
- The encryption method is very strong. Services differ in strength, but even the "worst" is very good
- You need two pieces of info to decrypt your info, and it's very difficult for someone to get both
- IMHO it's God's gift to modern password security, right up there with two factor authentication
O2
* Of course anything can happen if the hacker is able to modify source code, which is what the SolarWinds hack was based upon.
Last edited by O2HeN2; 07-26-2021 at 09:28.
YOU are the first responder. Police, fire and medical are SECOND responders.
When seconds count, the police are mere minutes away...
Gun registration is gun confiscation in slow motion.
My feedback: https://www.ar-15.co/threads/53226-O2HeN2
What this guy said ^^^^
If your post count is higher than your round count, you are a troll.
^From a layman's perspective, this is accurate description for many of the common services/methods (but not all).
That said, for those with a significantly lower risk-tolerance - it needs to be mentioned that most of those considerations make a number of assumptions which in many instances may be suspect due to improper implementation....Crypto is hard for most folks to really grasp at a fundamental level, which often results in mistakes being made.
In other words, one could throw in all the bells-and-whistles (e.g. latest crypto algorithms, enormous key-space/length, massive-entropy RNG/IV, decoupled Dek/Kek, HSMs, etc.), and still have a simple/stupid mistake undermine the whole thing.
Have seen similar situations multiple times, some of which boggle the mind....
Last edited by DireWolf; 07-26-2021 at 14:06.