It's a good thing not just everybody can afford a raspberry pi zero that would be necessary to crack an MD5 in seconds
Technology
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
That really depends on the password complexity. Sure, you can crack a password of 6-8 characters in below 30 minutes, but anything more complex than that will take days and longer.
My default password is 22 characters long and includes a unique identifier for each service plus a checksum. Say as an example (similar enough to my actual use case) for Adobe I'll have "Ae" (first and last letter of the service) and "41" in a specific position (A = 41 in Hex).
That way even if I repeat the other 18 characters (including symbols, upper and lower case characters) it will take years or even decades on a consumer grade system to crack my password, and the hash is unique for each service/website, so there won't be any collateral damage either, even if some service I used got breached and my password somehow fully exposed.
Why do people humble brag about their password strength, but then tell the whole world how to construct rainbow tables designed to crack their passwords?
Iirc rainbow tables are currently useless due to ~~good seasoning~~ salt.
Though password crackers can take a known pattern to drastically increase speed it would still have to do the whole calculation for every password.
Like I mentioned, I'm using a related pattern, nothing as simple as the one I sketched out here.
As long as the other 18 characters are randomly generated that seems secure enough, and a decent way to keep track of which passwords are associated with which accounts.
Feels like just a roundabout an exceptionally more difficult way to achieve a strong password versus just a password manager. Where you can do ridiculous things like have a 100 character long password
~~Only to discover that the website will accept 100 characters in the box but actually truncate it to like 40 without telling you~~
I think I'll stick with a password manager and its randomly generated passwords instead of doing an algebra problem every time I want to check my email
I guess then "hunter2" users are in trouble.
Some companies may also just be storing passwords in plaintext.