We'd like to remind Forumites to please avoid political debate on the Forum... Read More »
We're aware that some users are experiencing technical issues which the team are working to resolve. See the Community Noticeboard for more info. Thank you for your patience.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
How safe is encryption actually?
Options
Comments
-
JustAnotherSaver said:k_man said:JustAnotherSaver said:GDB2222 said:I have one password that has been thoroughly compromised.Anyway, now the cabling question has been answered, I can get on with asking about this...How do you know it's been compromised? Have various accounts been hacked?
https://haveibeenpwned.com/
If there are any results, there is significant risk that the associated password used on that system has also been compromised.
You can also check if a specific password is in a compromise list here:
https://haveibeenpwned.com/Passwords
Note: this does involve sending a hashed version of your password to the site (ETA: you don't have to hash the password yourself, this was just highlighting that you are sending your password to the site, albeit not in plain text)
Many password managers can do both these checks automatically for you.
Finally, not showing in these lists doesn't mean you credentials aren't leaked, just that they are not in the public lists (yet).Interesting.One of my email addresses has been in 7 data breaches, but the one I use for 'official' stuff hasn't been in any.A typical password I'll use has been 'seen' 4 times, however a variation of it hasn't been seen at all.Thing is - what does this actually MEAN? In normal-talk.It's been compromised - so what?It's been in a data breach - so what?Password has been 'seen' - well by who, and how, and regardless, so what?If my details had been got at then surely they would've accessed my stuff, yet they haven't. Or they have but never did anything & I never got any alerts to say my account had suddenly been accessed from halfway across the world.So things are riskier but what does THAT mean? Someone has all my details & they're just waiting for the right day to use them?
Yes. Albeit not someone, but anyone with nefarious intentions has access to the list of passwords and/or usernames.
These details are used to try all common systems, when they get around to it.
You may not know because:
No one has tried yetOrYou have 2FA, so they don't get inOrThe compromised system doesn't alert youOrYou are lucky and no one will ever tryAnd how has my keyboard smash, not even a proper word password been 'seen'? Tracker files on my PC?
Most likely is that one of the systems you used the password on has been compromised, and stored the password weakly.
Or you accidentally typed/pasted it somewhere
Or, you have malware on one of your systems (least likely).
Normal (non malware) web tracking cookies etc wouldn't leak this.
But if you used unique and strong passwords on each site, then there is no need to rely on luck for these type of risks.
A really strong password is only as strong as the systems that store it.
As such a good strong password used many times is, in general, much worse, than unique but less strong.
As in the latter, the weakest system risks all the others.
Better than both is strong and unique.
2 -
Of course talking about passwords that have been seen/part of a breach or whatever, if you use different email addresses for each site you visit then the breach is only valid for that site and if said site uses 2FA then ...work it out it's not really a problem. I remember by accounts with Adobe being leaked years ago, but of course I have new emails for them now.Edited of course the compromised emails i used just go to the bin.4.8kWp 12x400W Longhi 9.6 kWh battery Giv-hy 5.0 Inverter, WSW facing Essex . Aint no sunshine ☀️ Octopus gas fixed dec 24 @ 5.74 tracker again+ Octopus Intelligent Flux leccy0
-
There are types of 'attacks':
OnlineWhere the live system is targeted. For most systems this means known/likely username and password are required.
Access attempts are massively limited, so all users with all passwords, or more brute force is not feasible
OfflineA copy of data is accessed, and is available offline e.g. login details database is downloaded (usernames are usually not encrypted), or an encrypted file (where there is no username). In this case access attempts can be very very high rate and usually go through: common passwords, password lists, all possible passwords (brute force).
In this case the only protection is unique and long passwords, ideally with extended character sets (not just numeric, alpha, or alphanumeric)1 -
This is quite an interesting chart - worth checking your 4 passwords on this and see how they stand up to an offline attack.
Of course that is just brute force, if your password contains any dictionary words (including those "0bfu5c4ted" in this way) it is much quicker.
Over 15 years ago I thought I knew it all and went down the path of a standard password for every account. I thought it was uncrackable, 10 characters, no dictionary words and met the criteria of the last column. I could memorise it yet it was complex enough not to be brute forced in a reasonable time - although that is reducing rapidly.
That was until I got a notification of a suspicious log in from the Philippines on one of my online accounts a couple of years ago. I doubt it was brute forced, probably leaked somehow, I have so many online accounts.
I spent a week changing over 700 account with the same password to unique randomly generated 15 character ones - they are all now safe from brute force and if one of them gets leaked, no other accounts are compromised.
Funnily enough I got a notification 3 days ago about that original password being found in a data breach, I'm so glad I changed everything when I did. I still use it for a couple of minor internal systems on my network which is why it was picked up by Google password manager, those have also now been changed.
3 -
That's an interesting chart.Looks like the earlier format of my password will be in the 2 hours to 3 years category (11 lower case characters, mixture of letters & numbers) with the revised form being 3 years (11 characters, upper & lower with numbers) to 3000 years (12, upper, lower, numbers & special character)Looking in my password manager, I have 300-350 entries for various things. Banking, forums, general internet, emails.Currently using KeePass which is manual. I like it but I was considering switching to something that's a bit more automatic.Side unrelated note - Why can I hear the 8TB drive I bought last week when I'm trying to access files off it? It's a Seagate Ironwolf 8TB. I had the 6TB version (which is the one that had that issue last week) which was quiet.0
-
JustAnotherSaver said:Imagine if this was a coffee shop...Do you do a cappuccino here?We do a latte, a mocha, a cortado, a flat white........................Yeah I just want to know if you do a cappuccino.Well IF you had asked if we do cappuccino's, then the answer would be yes.
On web forums that cover things like networking questions like: "I'm thinking of cabling up my house, should I buy CAT6 or CAT6A?" are very common - lots of people waste money buying CAT6A, thinking it's "the best" - which is how people interpreted the question.0 -
Ergates said:JustAnotherSaver said:Imagine if this was a coffee shop...Do you do a cappuccino here?We do a latte, a mocha, a cortado, a flat white........................Yeah I just want to know if you do a cappuccino.Well IF you had asked if we do cappuccino's, then the answer would be yes.
On web forums that cover things like networking questions like: "I'm thinking of cabling up my house, should I buy CAT6 or CAT6A?" are very common - lots of people waste money buying CAT6A, thinking it's "the best" - which is how people interpreted the question.Please don't be like the politician on page 2.This isn't a game of chess. We do not need to be thinking 20 moves ahead. It really was just a simple case of what is this cable, is it this or that.Oh it's that? Right, ok thanks. Bye.It was honestly that simple.I know this is an unpopular opinion here but not everything has to lead somewhere. Some things can be taken on face value.0 -
[Deleted User] said:This is quite an interesting chart - worth checking your 4 passwords on this and see how they stand up to an offline attack.
Of course that is just brute force, if your password contains any dictionary words (including those "0bfu5c4ted" in this way) it is much quicker.
Over 15 years ago I thought I knew it all and went down the path of a standard password for every account. I thought it was uncrackable, 10 characters, no dictionary words and met the criteria of the last column. I could memorise it yet it was complex enough not to be brute forced in a reasonable time - although that is reducing rapidly.
That was until I got a notification of a suspicious log in from the Philippines on one of my online accounts a couple of years ago. I doubt it was brute forced, probably leaked somehow, I have so many online accounts.
I spent a week changing over 700 account with the same password to unique randomly generated 15 character ones - they are all now safe from brute force and if one of them gets leaked, no other accounts are compromised.
Funnily enough I got a notification 3 days ago about that original password being found in a data breach, I'm so glad I changed everything when I did. I still use it for a couple of minor internal systems on my network which is why it was picked up by Google password manager, those have also now been changed.
Brute force needs some explanation on that chart, because it assumes that a hashed version of the password is in the hands of the cracker, which is a big assumption. It's not how long it would take with repeated attempts to log in via a web page.
Rainbow tables exist for smaller lengths / complexities already, but they get into terabytes in size around the red/orange boundary on the chart.Proud member of the wokerati, though I don't eat tofu.Home is where my books are.Solar PV 5.2kWp system, SE facing, >1% shading, installed March 2019.Mortgage free July 20230 -
onomatopoeia99 said:Deleted_User said:This is quite an interesting chart - worth checking your 4 passwords on this and see how they stand up to an offline attack.
Of course that is just brute force, if your password contains any dictionary words (including those "0bfu5c4ted" in this way) it is much quicker.
Over 15 years ago I thought I knew it all and went down the path of a standard password for every account. I thought it was uncrackable, 10 characters, no dictionary words and met the criteria of the last column. I could memorise it yet it was complex enough not to be brute forced in a reasonable time - although that is reducing rapidly.
That was until I got a notification of a suspicious log in from the Philippines on one of my online accounts a couple of years ago. I doubt it was brute forced, probably leaked somehow, I have so many online accounts.
I spent a week changing over 700 account with the same password to unique randomly generated 15 character ones - they are all now safe from brute force and if one of them gets leaked, no other accounts are compromised.
Funnily enough I got a notification 3 days ago about that original password being found in a data breach, I'm so glad I changed everything when I did. I still use it for a couple of minor internal systems on my network which is why it was picked up by Google password manager, those have also now been changed.
Brute force needs some explanation on that chart, because it assumes that a hashed version of the password is in the hands of the cracker, which is a big assumption. It's not how long it would take with repeated attempts to log in via a web page.
Rainbow tables exist for smaller lengths / complexities already, but they get into terabytes in size around the red/orange boundary on the chart.0 -
JustAnotherSaver said:Ergates said:JustAnotherSaver said:Imagine if this was a coffee shop...Do you do a cappuccino here?We do a latte, a mocha, a cortado, a flat white........................Yeah I just want to know if you do a cappuccino.Well IF you had asked if we do cappuccino's, then the answer would be yes.
On web forums that cover things like networking questions like: "I'm thinking of cabling up my house, should I buy CAT6 or CAT6A?" are very common - lots of people waste money buying CAT6A, thinking it's "the best" - which is how people interpreted the question.Please don't be like the politician on page 2.This isn't a game of chess. We do not need to be thinking 20 moves ahead. It really was just a simple case of what is this cable, is it this or that.Oh it's that? Right, ok thanks. Bye.It was honestly that simple.I know this is an unpopular opinion here but not everything has to lead somewhere. Some things can be taken on face value.1
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 350.8K Banking & Borrowing
- 253K Reduce Debt & Boost Income
- 453.4K Spending & Discounts
- 243.7K Work, Benefits & Business
- 598.5K Mortgages, Homes & Bills
- 176.8K Life & Family
- 256.9K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.1K Discuss & Feedback
- 37.6K Read-Only Boards