That’s simply false. Increased length increases the entropy of a password, making it harder to brute force to gain access.
You have to go out of your way to restrict the length of passwords. There’s absolutely no reason to do it, and it is contrary to all good security practices.
BradleyUffner@lemmy.world 1 week ago
I really hope you don’t work in the tech industry.
possiblylinux127@lemmy.zip 1 week ago
I’ve yet to see anyone link to a source
Here is where I’m getting my info
cybersecuritynews.com/nist-rules-password-securit…
SkaveRat@discuss.tchncs.de 1 week ago
you realize that they say the exact opposite of what you are saying, right?
possiblylinux127@lemmy.zip 1 week ago
You haven’t provided any evidence to support your claim. Online accounts can’t easily be brute forced.
If a hash is leaked you just change the password. As long as you aren’t reusing the same password everywhere you are fine.
humorlessrepost@lemmy.world 1 week ago
If the hashes are leaked and that’s immediately caught and customers are immediately informed, just change your password.
Kissaki@feddit.org 1 week ago
How do you know when a password is leaked?
What’s the distribution of variance in brute force protections on online services?
possiblylinux127@lemmy.zip 6 days ago
Why would it matter? If they can access the password they probably can access everything else on that service. Just don’t reuse passwords.