[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1749762101818839.jpg (24 KB, 318x256)
24 KB
24 KB JPG
Why is this allowed??

>Have at least 8 characters
>Have upper and lowercase letters, and at least one number
>Have less than 4 repeated characters
>Not contain any of your personal information
>Be different from your previous 5 passwords
>Not contain commonly used words
>>
why are they keeping the old passwords?
>>
>>107090718
NIST recently updated it's guidelines, take a look
Password switching is out, long passwords are in
It's a computer program that would be cracking my pass, using a $ instead of an S doesn't do anything to slow it down
>>
>>107090806
>No More Frequent Password Changes:
NIST now advises against mandatory periodic password changes unless there is evidence of a breach or suspicion of compromise. The rationale is that forcing users to change their passwords too frequently often leads to weaker passwords being created

>Longer, Stronger Passwords:
NIST now encourages the use of longer passwords—suggesting that they should be at least 12-16 characters long for most scenarios. This is because longer passwords exponentially increase the difficulty of a brute-force attack, making them far more secure than shorter, simpler passwords.
NIST also recommends using a passphrase (a combination of random words or a memorable sentence) instead of complex but hard-to-remember character strings, which can improve both security and usability.

>Complexity Requirements Relaxed:
There’s a move away from enforcing overly strict password complexity rules (like requiring uppercase letters, numbers, and special characters). Instead, the focus is on length and entropy (the randomness or unpredictability of a password). Users are still encouraged to avoid obvious patterns (e.g., "password123") but are not forced into creating overly complex, hard-to-remember passwords.

>Use of Multi-Factor Authentication (MFA):
NIST strongly encourages the use of multi-factor authentication (MFA) wherever possible. Even with strong passwords, MFA adds an additional layer of security, significantly reducing the risk of unauthorized access.

>Password Blacklists:
Passwords that are known to be weak or commonly used (e.g., "123456", "password", "qwerty") are now explicitly discouraged. Systems are encouraged to use password blacklists to prevent users from choosing weak passwords, further increasing security.

>Password Managers:
Because it can be difficult to remember long and complex passwords, NIST encourages the use of password managers to help store and generate secure passwords.
>>
Anon007@gmail.com
is my password good enough
>>
>>107090872
Follow the rolls anon here >>107090846
>>
>>107090718
That's not too bad.
A common huge red flag that a website has dogshit security is a maximum password length. Just last week I encountered a max length of 16 characters. That means they're most likely not using any proper hash function and probably even storing it as plaintext.
>>
>>107090895
name the site anon
>>
>>107090718
haha OP I love froggo XD
>>
File: images.jpg (26 KB, 424x471)
26 KB
26 KB JPG
>>107091349
>>
>>107090735
Hopefully they're just keeping the hashes.

>>107090806
If by recently you mean like 10 years ago. Jeets apparently didn't get the memo because it seems like the old ways are only increasing.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.