• kevincox@lemmy.ml
    link
    fedilink
    arrow-up
    36
    arrow-down
    1
    ·
    1 year ago

    Drop “memorable”. 99.9% of your passwords should be managed by your password manager and don’t need to be memorized. On one or two passwords that you actually need to type (like your computer login) need to be memorable.

    • demonsword@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      1
      ·
      1 year ago

      99.9% of your passwords should be managed by your password manager

      this looks like a sensible approach until you remember password managers can be cracked, too. I’m with GP on this, a passphrase is easier to remember and is good enough for most use cases, if you need more security you should be using some form or another of 2FA anyway

      • Gamma@programming.dev
        link
        fedilink
        English
        arrow-up
        18
        ·
        1 year ago

        I have 350 items in my BW vault. I am not memorizing that many passwords, I’d rather use my brain for something else.

      • kevincox@lemmy.ml
        link
        fedilink
        English
        arrow-up
        14
        ·
        1 year ago

        I encourage you to think critically about this and re-evaluate your decision. I would say that for at least 99.99% of people a password manager is significantly more secure overall.

        • Browser-integrated password managers will avoid filling your password into the wrong site. This is a great barrier to phishing.
        • Allows a unique password per-site which greatly mitigates the problem of password leaks which are fairly common.
        • Allows you to use much stronger passwords than you can memorize.
        • It’s quite convenient to just click “login”.

        For most people phishing is a far bigger risk than some malware stealing their local password databases. To make database theft even less of a concern most password managers have the option to encrypt the local database file. This means that to steal your passwords the malware will need to extract the encryption key from the password manager process which can often be configured to forget the key quickly after the last use.

        Also consider that if you have malware that can steal your password database and the encryption key it can probably just keylog all your passwords or steal your browser’s cookie jar. So the extra barrier here is minimal.

        I think you are right to be suspicious of having a vault of passwords “ready to steal” but in practice the upsides far outweigh the downsides, especially if you make a security-focused choice of password manager.

      • Scraft161@iusearchlinux.fyi
        link
        fedilink
        English
        arrow-up
        10
        ·
        1 year ago

        I’ve been using keepassxc for a while now and it’s better than most other options, everything is stored locally and encrypted behind a master password.

        All you micht want to do is make a backup of your vault onto an external drive (best practice would be encrypted via the options you have, I use luks because I’m a Linux nerd).

        • livendie@beehaw.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Agreed. Have my password database backed up over multiple places, GPG encrypted of-coarse, you can never be too safe.

      • CanadaPlus@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        I’m in the same boat at this point, partly just because I’m not sure how I want to partition things and if the software will work together the way I want.

        I assume password managers themselves store things encrypted until you unlock them with whatever master password.

      • dan@upvote.au
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        I’ve got 1601 logins and 86 secure notes in my Bitwarden vault… no way I’m memorizing all of that lol