Disclaimer: I use a password manager, so please don’t direct your comments at me.


So I know this person that says they don’t use a password manager because they have a better system like… I’m gonna give an example:

Lets say, a person loves Star Wars, and their favorite character is Yoda. The favorite Their favorite phrase is from The Good Place “This is the Bad Place!”. And their favorite date is 1969 July 20th (first landing on moon).

So here:

Star Wars Yoda = SWYd

“This is the Bad Place!” = ThIThBaPl!

1969 July 20 —> 69 07 20

So they have this “core” password = SWydThIThBaPl!690720

Then for each website, they add the website’s first and last 2 characters of the name to the front of the password…

So, “Lemmy Forum” = leum

Add this to the beginning of the “core” password it becomes:

leumSWydThIThBaPl!690720

For Protomail Email it’s: prilSWydThIThBaPl!690720

For Amazon Shopping it’s: amngSWydThIThBaPl!690720

Get the idea?

The person says that, since the beginning of the password is unique, its “unhackable”, and that the attacker would need like 3 samples of the password to figure out their system.

Is this person’s “password system” actually secure?

  • @JeeBaiChow@lemmy.world
    link
    fedilink
    635 days ago

    I used to do this. Have a system for generating a unique password for each site. But then one site got hacked and I had to reset my password, and I couldn’t use the old password. So I had to make a new system. You see the problem.

    • @Takapapatapaka@lemmy.world
      link
      fedilink
      64 days ago

      A solution to this is to keep adding elements to the chain to create a new password. Like your base password is FavouriteCharacter2025siteletters, and if you need to change it, go for FavouriteCharacter2025siteletters!!!

      If you add the same element across accounts when you need to change a pw, it’s still easy to remember, just a few more try when you forget it, it’s still useful against database leaks, and it’s not worse when it comes to targeted hack.

  • @BillDaCatt@lemmy.world
    link
    fedilink
    English
    305 days ago

    There are two answers to your question.
    Most password cracking operations target a database of user accounts in bulk. As long as the hacker is not targeting your friend specifically, they should be fine.
    If your friend is the target, one or two successful hacks could make their other passwords vulnerable.

  • @9point6@lemmy.world
    link
    fedilink
    204 days ago

    I used to use a similar system until I switched to a password manager. Convenience is a big factor, it’s nice to not have to think about logging in. Also coupled with that a secure password is a long password, so not having to type it in is a bonus.

    The person says that, since the beginning of the password is unique, its “unhackable”, and that the attacker would need like 3 samples of the password to figure out their system.

    I’ve had my data leaked more than 3 times, it’s not an unlikely scenario that someone could get a list of passwords used by someone.

    Also once their system is compromised, they have to come up with a new system, then go and change every password. Which if it was me would be hundreds of places. With a password manager there’s no reason not to have completely unique passwords for everything, so if there is a leak, oh well, just change that password.

  • @hperrin@lemmy.ca
    link
    fedilink
    English
    7
    edit-2
    3 days ago

    It’s probably not safe if they use that for everything. Someone could match emails and password suffixes, then they’d only have four letters to brute force. So all it takes is two leaks that your friend is on and they’re at real risk.

    Generally, this would be avoided by whatever site storing their passwords as hashes instead of in plain text, but you can’t rely on that.

    They should just use a password manager.

    • @uranibaba@lemmy.world
      link
      fedilink
      44 days ago

      From what I understand, they (hackers) try known email/password combinations at different sites because a lot of people reuse their passwords. I also find it unlikely that anyone trying hack accounts will spend any amount of time looking at individual passwords if their list is 1000+ (and we know there are leaks in the milions).

      I agree that they are reasonably save unless they are targeted.

      • @hperrin@lemmy.ca
        link
        fedilink
        English
        24 days ago

        The problem is that it’s a common suffix among all of their passwords. That kind of thing is easy to search for in a password leak database.

  • @yesman@lemmy.world
    link
    fedilink
    115 days ago

    This system is fine. While patterns are obviously easier to hack, having unique passwords for each site and being able to remember them puts your friend in the 90th percentile of computer users.

  • @halcyoncmdr@lemmy.world
    link
    fedilink
    English
    105 days ago

    For random password dumps going through thousands of accounts it’s probably fine, but if you’re targeted for some reason and they get just a couple passwords. With even just 2 passwords, that system may be obvious already to someone looking to gain access to your accounts specifically.

  • @null_dot@lemmy.dbzer0.com
    link
    fedilink
    English
    95 days ago

    I reject the premise!

    There is no safe or unsafe. It’s more like “more safe for a given person”.

    Your friend’s system is better than using the same password everywhere. It’s more difficult to hack than the majority of passwords that aren’t generated by password managers. If that’s what your friend likes and works for them well, fine I guess.

    It wouldn’t work for me because:

    • it doesn’t input the password for you. Does your friend really type passwords in all the time?
    • IDK if my memory is particularly bad but having to remember anything at all is hit and miss. Like I could remember those characters that are used everywhere, but for the router at my mum and dads house that I haven’t accessed in 5 years, was it “mums router” or “router mums house
    • Also I manage multiple passwords for the same sites, as in credentials for my partner or whatever, but I guess I could make variant of this system.
    • also if I were to die the person who sorts out all my stuff will have access to my passwords
    • but the main reason is… I use my keepassxc db as a database for all sorts of things which aren’t necessarily passwords. ssh keys are a good example. I use it for TOTP. bank card details. membership numbers and government ids. VIN numbers for vehicles. Also, a weird one, I have to keep track of about 100 physical keys for reasons, I stamp a number on them like k32 and then store that number and an explanation of what it’s for in my db.
  • @zxqwas@lemmy.world
    link
    fedilink
    55 days ago

    Better than a lot of other methods. What are you protecting, from who and how annoying would it be to recover if it went wrong. I don’t use a password manager because I’d lose the file for sure and it would be just as inconvenient to recover as if someone hacked me. I also don’t have any sensitive stuff. Work on the other hand I have a password manager.

    The lowest hanging fruit is using a leaked/hacked/stolen list of accounts/emails and passwords and trying them on other sites. You should be safe from that.

    If you have sensitive information someone would be willing to break the law and spend a few thousands of dollars to get you’re not safe.

  • I get the idea as I used to do this too. Having secure & different passwords everywhere is just the basic way to go. As such I dont think though its a good idea to put a system in your passwords. Hacking attempts are automated and getting smarter every day. Its only a matter of time until someone unleashes an AI to look for patterns and you are toast.

    I recommend to juse a decent password manager that generates them for you and as much MFA as possible.

  • @BananaTrifleViolin@lemmy.world
    link
    fedilink
    English
    3
    edit-2
    5 days ago

    So no this is not safe. Once ypu have a system it is easier to crack because if someone has 2 or more of your passwords they can work out there is a system and it’d make it much easier to crack others if they’re determined.

    It is unlikely that someone random would specifically target a person and systematically try and crack their passwords. If that were to happen it’d most likely he someone they know - and this does happen sometimes. So while the passwords are definitely flawed it may not be something that anyone takes the time to exploit. But you can never say never.

    The best way to manage passwords probably remains a secure password manager and randomly generated series of characters for each site. If its truly random then there are no shortcuts and every single password stands independently. The password manager gets round the issue of memorising them.

  • @Yermaw@lemm.ee
    link
    fedilink
    35 days ago

    Its secure enough for the average person. If your friend was a big deal, super rich or powerful and a massive target it would be easy enough to figure out.

    I doubt it would be worthwhile trying to crack that particular code for the average joe.

  • @foggy@lemmy.world
    link
    fedilink
    25 days ago

    If it is sufficiently long, and the pattern is in any way dynamic then yes.

    If they’re doing something like lemmy-core-420 then no.

    A drummer friend used to do a few bars of a different rudiment. Like djddjdjjdjddjdjjdjddjdjjdjddjdjj and then account for PW rules