We'd like to remind Forumites to please avoid political debate on the Forum... Read More »
We're aware that some users are experiencing technical issues which the team are working to resolve. See the Community Noticeboard for more info. Thank you for your patience.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
Where is the safest place to save all my pin numbers and passwords?
Options
Comments
-
flopsy1973 said:I have mine saved on Google password manager on my account is this not safe enough ?0
-
masonic said:Barkin said:masonic said:PRAISETHESUN said:masonic said:pafpcg said:PRAISETHESUN said:+1 for a password manager for this sort of thing. Make sure you use a very strong master password + 2FA on it to protect the contents. Since you don't need to memorise the individual passwords apart from the master one, I then make sure to use the longest fully random alpha-numeric + symbol password that each site allows. It's a bit of a game for me to see how long I can make them. The longest password I have is a 4096 character oneHmmm, you might think your password is 4096 characters....It's not unknown for systems to simply truncate a password to a more easily hashed value - how would you know? Have you tried supplying that system with just the first 4095 characters and checking it's rejected?Not unheard of, and something I've experienced. Far more common, and considered best practice, is to hash the password to a constant bit length. Meaning there is no additional security obtained through the use of a more complex password than the resultant hash. 256-bit is very common, corresponding to approx 32 characters (upper and lower alphanumeric + symbols). Some extra padding can help counter predictability, but anything over 100 would seem overkill. I've not got any longer than 64 (complex) charsThen there is the ever more common practice of asking for 3 random characters from the password,
I regularly get asked for random characters from an answer to a security question/phrase etc, but never from a password.I wouldn't make a distinction between passwords, PINs, and "security questions". They are all a single factor and different providers use them interchangeably. If a provider asks for one "something you know" in full and then random characters of another "something you know" to log in, then they are engaging in this practice.
Enter the 4th, 13th and 7th characters from a (strong, password manager generated for example) password, where the password is cFe2#1Ww5X*5Sa7l
is somewhat different to entering the 1st, 4th and 5th characters of the name of your 1st pet - Tiddles.0 -
EarthBoy said:flaneurs_lobster said:Barkin said:masonic said:PRAISETHESUN said:masonic said:pafpcg said:PRAISETHESUN said:+1 for a password manager for this sort of thing. Make sure you use a very strong master password + 2FA on it to protect the contents. Since you don't need to memorise the individual passwords apart from the master one, I then make sure to use the longest fully random alpha-numeric + symbol password that each site allows. It's a bit of a game for me to see how long I can make them. The longest password I have is a 4096 character oneHmmm, you might think your password is 4096 characters....It's not unknown for systems to simply truncate a password to a more easily hashed value - how would you know? Have you tried supplying that system with just the first 4095 characters and checking it's rejected?Not unheard of, and something I've experienced. Far more common, and considered best practice, is to hash the password to a constant bit length. Meaning there is no additional security obtained through the use of a more complex password than the resultant hash. 256-bit is very common, corresponding to approx 32 characters (upper and lower alphanumeric + symbols). Some extra padding can help counter predictability, but anything over 100 would seem overkill. I've not got any longer than 64 (complex) charsThen there is the ever more common practice of asking for 3 random characters from the password,
I regularly get asked for random characters from an answer to a security question/phrase etc, but never from a password.0 -
Barkin said:masonic said:Barkin said:masonic said:PRAISETHESUN said:masonic said:pafpcg said:PRAISETHESUN said:+1 for a password manager for this sort of thing. Make sure you use a very strong master password + 2FA on it to protect the contents. Since you don't need to memorise the individual passwords apart from the master one, I then make sure to use the longest fully random alpha-numeric + symbol password that each site allows. It's a bit of a game for me to see how long I can make them. The longest password I have is a 4096 character oneHmmm, you might think your password is 4096 characters....It's not unknown for systems to simply truncate a password to a more easily hashed value - how would you know? Have you tried supplying that system with just the first 4095 characters and checking it's rejected?Not unheard of, and something I've experienced. Far more common, and considered best practice, is to hash the password to a constant bit length. Meaning there is no additional security obtained through the use of a more complex password than the resultant hash. 256-bit is very common, corresponding to approx 32 characters (upper and lower alphanumeric + symbols). Some extra padding can help counter predictability, but anything over 100 would seem overkill. I've not got any longer than 64 (complex) charsThen there is the ever more common practice of asking for 3 random characters from the password,
I regularly get asked for random characters from an answer to a security question/phrase etc, but never from a password.I wouldn't make a distinction between passwords, PINs, and "security questions". They are all a single factor and different providers use them interchangeably. If a provider asks for one "something you know" in full and then random characters of another "something you know" to log in, then they are engaging in this practice.
Enter the 4th, 13th and 7th characters from a (strong, password manager generated for example) password, where the password is cFe2#1Ww5X*5Sa7l
is somewhat different to entering the 1st, 4th and 5th characters of the name of your 1st pet - Tiddles.When you know you'll be asked for random characters, that's all the more reason to go with a strong complex string. Either password or memorable info. I don't think it is good practice to use actual answers for security questions. Not least because others may know this information and security details will be then have to be shared between sites as there is so much overlap between questions.In most cases, I get asked for answers to memorable info type questions in full (sometimes over the phone), so I use random phrases rather than a complex string.0 -
masonic said:Eyeful said:flopsy1973 said:I have mine saved on Google password manager on my account is this not safe enough ?
Examples are:
Bitwarden (free)
Password XC (free)
1Password (paid)0 -
I use 1Password its really good but it does costLow Carb High Fat is the way forward I lost 80 lbs
Since first using Martins I have saved thousands0
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 350.8K Banking & Borrowing
- 253K Reduce Debt & Boost Income
- 453.5K Spending & Discounts
- 243.8K Work, Benefits & Business
- 598.6K Mortgages, Homes & Bills
- 176.8K Life & Family
- 257K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.1K Discuss & Feedback
- 37.6K Read-Only Boards