this post was submitted on 04 Oct 2025
166 points (96.1% liked)

Today I Learned

25108 readers
588 users here now

What did you learn today? Share it with us!

We learn something new every day. This is a community dedicated to informing each other and helping to spread knowledge.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must begin with TIL. Linking to a source of info is optional, but highly recommended as it helps to spark discussion.

** Posts must be about an actual fact that you have learned, but it doesn't matter if you learned it today. See Rule 6 for all exceptions.**



Rule 2- Your post subject cannot be illegal or NSFW material.

Your post subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Posts and comments which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding non-TIL posts.

Provided it is about the community itself, you may post non-TIL posts using the [META] tag on your post title.



Rule 7- You can't harass or disturb other members.

If you vocally harass or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.

For further explanation, clarification and feedback about this rule, you may follow this link.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.

Unless included in our Whitelist for Bots, your bot will not be allowed to participate in this community. To have your bot whitelisted, please contact the moderators for a short review.



Partnered Communities

You can view our partnered communities list by following this link. To partner with our community and be included, you are free to message the moderators or comment on a pinned post.

Community Moderation

For inquiry on becoming a moderator of this community, you may comment on the pinned post of the time, or simply shoot a message to the current moderators.

founded 2 years ago
MODERATORS
top 42 comments
sorted by: hot top controversial new old
[–] aesthelete@lemmy.world 8 points 55 minutes ago (1 children)

I would definitely use those passwords! /s

[–] FuCensorship@lemmy.today 2 points 52 minutes ago

Right! How good is the entropy?...

[–] possiblylinux127@lemmy.zip 3 points 1 hour ago

That isn't great from a security perspective

[–] tuckerm@feddit.online 27 points 7 hours ago (2 children)

I like the little tools like this that DuckDuckGo has. A couple others:

  • "color picker"
  • "base64 encode your_text_here" (and "base64 decode encoded_string_here" as well)
  • "json formatter"
[–] wetnoodle@lemmy.blahaj.zone 16 points 5 hours ago (2 children)

my favorite is "qr code" best and easiest qr code generator

[–] pineapplelover@lemmy.dbzer0.com 1 points 13 minutes ago

Yeah I used it to convert my totp token to qr code. Works great

[–] tuckerm@feddit.online 3 points 3 hours ago

Whoa, that one is great.

[–] hr_@lemmy.world 4 points 6 hours ago (1 children)
[–] tuckerm@feddit.online 2 points 6 hours ago

Oh cool, I didn't know about that one.

[–] TehBamski@lemmy.world 95 points 9 hours ago (4 children)

This seems like one picked up data packet away from being a bad idea. Am I overthinking this?

[–] Sir_Kevin@lemmy.dbzer0.com 4 points 2 hours ago

Yeah I think I'll just click an icon in my password manager instead.

[–] who@feddit.org 20 points 6 hours ago

You are not overthinking it. Exploiting this would be a bit more complex than capturing a packet on the wire, but it is possible.

If you intend to use a passphrase for anything important, it's best to generate it locally.

[–] Godort@lemmy.ca 49 points 8 hours ago (2 children)

This is probably fine. The connection to DDG will be over HTTPS, so a captured packet would need to be decoded first. And if someone were to manage to break the encryption, then they would also need to know what service you used the password for.

Ultimately, it's more secure to generate locally, but it would be a huge amount of work to get anything usable out of a packet capture

[–] warm@kbin.earth 10 points 7 hours ago (1 children)

Are they sending data? I'm pretty sure this will just be generated on the client.

[–] plz1@lemmy.world 24 points 7 hours ago

Yeah, I tested it. It's not a client side thing, it is part of the search page output.

[–] TehBamski@lemmy.world 2 points 8 hours ago* (last edited 8 hours ago) (1 children)

I'm no cybersecurity expert. But couldn't they just sniff your traffic to see where you (your packets) go and test the pw on each login for the last hour?

edit: I guess they are using DuckDuckGo, which has a higher level of privacy design and limits.

[–] kibiz0r@midwest.social 7 points 8 hours ago

This is why you should do DNS over HTTPS

[–] etchinghillside@reddthat.com 6 points 9 hours ago

There are certainly better ideas.

[–] 13igTyme@piefed.social 29 points 9 hours ago* (last edited 9 hours ago) (1 children)

If you're going to auto generate passwords, just use BitWarden.

[–] Telodzrum@lemmy.world 21 points 8 hours ago (3 children)

If you're going to use a password vault, use one you host yourself and not someone else's service.

[–] notarobot@lemmy.zip 5 points 2 hours ago

Lol, no. I don't trust myselft to keep it well maintained, up to date, nor available when it matters most.

[–] kbobabob@lemmy.dbzer0.com 2 points 3 hours ago (1 children)
[–] Telodzrum@lemmy.world 3 points 3 hours ago

So you agree?

[–] scintilla@crust.piefed.social 37 points 8 hours ago (1 children)

The difference in complexity in setting up bitwarden and using your own self-hosted instance of bitwarden is fucking massive. For 99.9% of people rhem using bitwarden would greatly improve their password security and bitwarden has proven to be better than the competition.

[–] cmrss2@aussie.zone 11 points 8 hours ago (1 children)

FYI Vaultwarden is simpler and should be easier to self-host

[–] guy@piefed.social 20 points 7 hours ago* (last edited 7 hours ago)

Would love to set up Vaultwarden, but I trust my own skills in hardening a server less than Bitwardens

[–] Kolanaki@pawb.social 8 points 7 hours ago* (last edited 7 hours ago) (1 children)

Alternatively, you can just roll your face on the keyboard and then take a screenshot of the resulting password to save it. 🤷‍♂️

[–] WhyIHateTheInternet@lemmy.world 5 points 7 hours ago

That's what I'm thinking. Is it really so hard to just make up s random string of symbols? I do it all the time but use acronym type things to remember it.

[–] Valmond@lemmy.world 5 points 7 hours ago

Short password please.

-"Penis"

[–] boredsquirrel@slrpnk.net 13 points 9 hours ago (3 children)

Ok but you should use passphrases. Better to type and remember in case you need to

[–] Kernal64@sh.itjust.works 8 points 7 hours ago (1 children)

That's great if you only have a couple of online accounts, but get past a few dozen and you're toast. I don't know about you, but I sure can't remember 50+ unique pass phrases. However, I can remember the one for my password manager, which has 30+ random character passwords for all my accounts.

[–] doctordevice@lemmy.ca 1 points 3 hours ago* (last edited 3 hours ago)

Passphrases are easier when you need to enter the password on a system that isn't logged into your vault, even if they are longer. I usually default to 3 word passphrase + random number at the end of a word + random special character in the middle of a word.

[–] SpikesOtherDog@ani.social 14 points 8 hours ago (1 children)

If you have a password vault, use the vault first.

For rotating PC login credentials, I use codified passphrases. They typically meet security needs, are unique and nearly unguessable because it could be ANYTHING in your office, and don't contain dictionary words. Example:

Annual evaluations are due before summer. Be sure to mention the Grodsky project! aeadB4S.Bs2mtGp.

Where did Julie's candy go? I ate it! She'll never know >:D

WdJcg?I8i!Snn>:D

Even if I had a perfectly secure connection, I'm still getting a password from a service that could be tracking me.

[–] D_C@sh.itjust.works 3 points 8 hours ago (1 children)
[–] SpikesOtherDog@ani.social 1 points 3 hours ago

I didn't type this right in the first place, but it DOES bring up a point.

Substituting symbols for letters, we always called it leet speak—but Wikipedia calls it munged—used to be considered safe quite some time ago.

It's better not to use real words because it makes it easier for password cracking tools. If you have to, it is better to mung them, but also misspell them.

pY@zvvuD is much stronger than p@55w0rd, even if it is harder to remember. In the same vein, my bunged password would have been slightly more secure, even if someone had found my pass phrase. But in my case, my password sucked because I would have probably come back trying to put a k at the end. I have munged them like that in the past, but it is extra to remember.

[–] NuXCOM_90Percent@lemmy.zip 3 points 8 hours ago* (last edited 8 hours ago)

Pass phrases for things that need to be human readable/rememberable.

Generated strings for everything else.

Because a pass phrase is inherently vulnerable to a dictionary attack because... it is words. You can obfuscate that but all the ways that would actually not compromise the readability are also pretty well known (whether that is "a=@" or "every 'e' is a 'b'" and so forth.

Is a 96 character pass phrase meaningfully more vulnerable than a 16 character generated string? That gets into the realm of hypotheticals and "one day we'll have quantum computers" but you are generally looking at a situation where everything is fucked anyway or there is a very targeted attack on you... at which point "hmm. 96 characters? Must be a pass phrase". So... not the venue to discuss.

But, at that point... if you are using a password manager/vault anyway...


Also the reality is that anyone who has ever dealt with a bank or some other "legacy" website rapidly learns that there are max lengths for passwords because they are more afraid of allocating a few extra megabytes for the SQL database than anything else. At which point your pass phrase goes out the window and you are back to "p@$$w0rd" level bullshit (or, better yet, you have a mental model/style of password).

[–] ech@lemmy.ca 5 points 7 hours ago

Or just use a locally hosted password generator for one that isn't handfed to you by a for-profit company...

[–] JustJack23@slrpnk.net 5 points 8 hours ago

It can also generate UUIDs. Very useful.

[–] ragebutt@lemmy.dbzer0.com 1 points 8 hours ago (1 children)

Why not local

Like just generate an md5 hash, truncate it to whatever arbitrary number the shitty website decided is their password length limit, then store it in an encrypted db

Of course this is just a long way of reinventing keepass/1password/bitwarden/icloud keychain/etc

[–] calliope@retrolemmy.com 3 points 7 hours ago (2 children)

If you’re already generating an md5 and truncating it (an md5 of what?), you might as well use pwgen.

[–] ragebutt@lemmy.dbzer0.com 1 points 3 hours ago

An md5 of whatever string pops in your head at that moment. True randomness is a persons nonsequitors

This makes sense. I had no idea what tools existed because as mentioned many db solutions exist for this

[–] toynbee@lemmy.world 2 points 7 hours ago

I haven't in a while, but back when I generated passwords for users, I would use the openssl command.