You haven’t provided any evidence to support your claim. Online accounts can’t easily be brute forced.
If a hash is leaked you just change the password. As long as you aren’t reusing the same password everywhere you are fine.
Comment on My password is not accepted because it is too long
BradleyUffner@lemmy.world 1 week agoI really hope you don’t work in the tech industry.
You haven’t provided any evidence to support your claim. Online accounts can’t easily be brute forced.
If a hash is leaked you just change the password. As long as you aren’t reusing the same password everywhere you are fine.
If the hashes are leaked and that’s immediately caught and customers are immediately informed, just change your password.
How do you know when a password is leaked?
What’s the distribution of variance in brute force protections on online services?
Why would it matter? If they can access the password they probably can access everything else on that service. Just don’t reuse passwords.
possiblylinux127@lemmy.zip 1 week ago
I’ve yet to see anyone link to a source
Here is where I’m getting my info
cybersecuritynews.com/nist-rules-password-securit…
SkaveRat@discuss.tchncs.de 1 week ago
you realize that they say the exact opposite of what you are saying, right?