I always wonder about this though. Are hackers really going to manually test out my password in miscellaneous sites? How would they know what sites to try? And why me along the hundreds of thousands of passwords they would have stolen with mine? Seems like that’s something they would do if they’ve targeted a particular person, not if they’ve stolen a whole dump of credentials
No, that won’t manually test it in random sites. They will add this creds to their bot net to test Mandy specific sites like Facebook, Twitter, GMail, several larger financial institutions, and many others.
Always use different strong passwords and use MFA wherever it’s available. Security, like ogres, has layers.
They create giant databases of every breached password in rainbow tables from previously breached password hashes, and then try them all if they ever expose another breach. If they get a database in a breach they can try a lot, like trillions, very fast.
Re-using passwords makes things much easier for them.
Bots attempt passwords on sites’ login forms all the time but aren’t very effective. Usually have hundreds a day even when I had a wedding site not even listed on google. Probably only works for very short and frequently used passwords.
Email and hashed password. If you’re like most people and use the same password everywhere, they gain access to everything if they manage to crack it.
My paranoia about data breaches has gone down so much since I started using email aliases and a password manager
Thank you automatically created Bitwarden password.
Glad I don’t reuse passwords.
I always wonder about this though. Are hackers really going to manually test out my password in miscellaneous sites? How would they know what sites to try? And why me along the hundreds of thousands of passwords they would have stolen with mine? Seems like that’s something they would do if they’ve targeted a particular person, not if they’ve stolen a whole dump of credentials
No, that won’t manually test it in random sites. They will add this creds to their bot net to test Mandy specific sites like Facebook, Twitter, GMail, several larger financial institutions, and many others.
Always use different strong passwords and use MFA wherever it’s available. Security, like ogres, has layers.
They create giant databases of every breached password in rainbow tables from previously breached password hashes, and then try them all if they ever expose another breach. If they get a database in a breach they can try a lot, like trillions, very fast.
Re-using passwords makes things much easier for them.
Bots attempt passwords on sites’ login forms all the time but aren’t very effective. Usually have hundreds a day even when I had a wedding site not even listed on google. Probably only works for very short and frequently used passwords.
Does lemmy use a salt?
I don’t know, but given the fact that it’s 2023 and it’s open source, I’d say yes.
One would hope so.