Comment on [deleted]

<- View Parent
sxan@midwest.social ⁨4⁩ ⁨weeks⁩ ago

… true. You were clearly talking about how the “root” was constructed. If the root were random, a weakness would still be inherent in having the root exposed means all your accounts are potentially compromised, but the social hacking wouldn’t be as much of an issue.

I skipped over the root generation, as it’s just a useless twist on an older process. “Useless” in that I don’t think it adds any value to construct a root from favorite things. It’s no easier than just memorizing a single 12-character random string and then adding per-site suffixes, which is how I first heard this described a decade ago.

source
Sort:hotnewtop