We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
Where is the safest place to save all my pin numbers and passwords?
Comments
-
Sure, I get what you're saying, but a password is likely very different to a memorable info type of response, from a usability viewpoint.masonic said:Barkin said:
Is this really becoming more common?masonic said:PRAISETHESUN said:
I agree it's probably overkill, but if they let me use a password of that length and there's no downside to doing so, then I'm going to use long passwords. If anything it only serves to future proof myself when they inevitably increase their security requirements.masonic said:pafpcg said:PRAISETHESUN said:+1 for a password manager for this sort of thing. Make sure you use a very strong master password + 2FA on it to protect the contents. Since you don't need to memorise the individual passwords apart from the master one, I then make sure to use the longest fully random alpha-numeric + symbol password that each site allows. It's a bit of a game for me to see how long I can make them. The longest password I have is a 4096 character one
Hmmm, you might think your password is 4096 characters....It's not unknown for systems to simply truncate a password to a more easily hashed value - how would you know? Have you tried supplying that system with just the first 4095 characters and checking it's rejected?Not unheard of, and something I've experienced. Far more common, and considered best practice, is to hash the password to a constant bit length. Meaning there is no additional security obtained through the use of a more complex password than the resultant hash. 256-bit is very common, corresponding to approx 32 characters (upper and lower alphanumeric + symbols). Some extra padding can help counter predictability, but anything over 100 would seem overkill. I've not got any longer than 64 (complex) charsThen there is the ever more common practice of asking for 3 random characters from the password,
I regularly get asked for random characters from an answer to a security question/phrase etc, but never from a password.I wouldn't make a distinction between passwords, PINs, and "security questions". They are all a single factor and different providers use them interchangeably. If a provider asks for one "something you know" in full and then random characters of another "something you know" to log in, then they are engaging in this practice.
Enter the 4th, 13th and 7th characters from a (strong, password manager generated for example) password, where the password is cFe2#1Ww5X*5Sa7l
is somewhat different to entering the 1st, 4th and 5th characters of the name of your 1st pet - Tiddles.0 -
Unless my online banking is different to yours, Lloyds & Halifax always require the password to be entered in full.EarthBoy said:
Lloyds, Halifax, TSB, and Nationwide also do it to access their online banking, as well as their apps, unless you use biometrics.flaneurs_lobster said:
Natwest/RBS do this when logging into Digital Banking.Barkin said:
Is this really becoming more common?masonic said:PRAISETHESUN said:
I agree it's probably overkill, but if they let me use a password of that length and there's no downside to doing so, then I'm going to use long passwords. If anything it only serves to future proof myself when they inevitably increase their security requirements.masonic said:pafpcg said:PRAISETHESUN said:+1 for a password manager for this sort of thing. Make sure you use a very strong master password + 2FA on it to protect the contents. Since you don't need to memorise the individual passwords apart from the master one, I then make sure to use the longest fully random alpha-numeric + symbol password that each site allows. It's a bit of a game for me to see how long I can make them. The longest password I have is a 4096 character one
Hmmm, you might think your password is 4096 characters....It's not unknown for systems to simply truncate a password to a more easily hashed value - how would you know? Have you tried supplying that system with just the first 4095 characters and checking it's rejected?Not unheard of, and something I've experienced. Far more common, and considered best practice, is to hash the password to a constant bit length. Meaning there is no additional security obtained through the use of a more complex password than the resultant hash. 256-bit is very common, corresponding to approx 32 characters (upper and lower alphanumeric + symbols). Some extra padding can help counter predictability, but anything over 100 would seem overkill. I've not got any longer than 64 (complex) charsThen there is the ever more common practice of asking for 3 random characters from the password,
I regularly get asked for random characters from an answer to a security question/phrase etc, but never from a password.0 -
Barkin said:
Sure, I get what you're saying, but a password is likely very different to a memorable info type of response, from a usability viewpoint.masonic said:Barkin said:
Is this really becoming more common?masonic said:PRAISETHESUN said:
I agree it's probably overkill, but if they let me use a password of that length and there's no downside to doing so, then I'm going to use long passwords. If anything it only serves to future proof myself when they inevitably increase their security requirements.masonic said:pafpcg said:PRAISETHESUN said:+1 for a password manager for this sort of thing. Make sure you use a very strong master password + 2FA on it to protect the contents. Since you don't need to memorise the individual passwords apart from the master one, I then make sure to use the longest fully random alpha-numeric + symbol password that each site allows. It's a bit of a game for me to see how long I can make them. The longest password I have is a 4096 character one
Hmmm, you might think your password is 4096 characters....It's not unknown for systems to simply truncate a password to a more easily hashed value - how would you know? Have you tried supplying that system with just the first 4095 characters and checking it's rejected?Not unheard of, and something I've experienced. Far more common, and considered best practice, is to hash the password to a constant bit length. Meaning there is no additional security obtained through the use of a more complex password than the resultant hash. 256-bit is very common, corresponding to approx 32 characters (upper and lower alphanumeric + symbols). Some extra padding can help counter predictability, but anything over 100 would seem overkill. I've not got any longer than 64 (complex) charsThen there is the ever more common practice of asking for 3 random characters from the password,
I regularly get asked for random characters from an answer to a security question/phrase etc, but never from a password.I wouldn't make a distinction between passwords, PINs, and "security questions". They are all a single factor and different providers use them interchangeably. If a provider asks for one "something you know" in full and then random characters of another "something you know" to log in, then they are engaging in this practice.
Enter the 4th, 13th and 7th characters from a (strong, password manager generated for example) password, where the password is cFe2#1Ww5X*5Sa7l
is somewhat different to entering the 1st, 4th and 5th characters of the name of your 1st pet - Tiddles.When you know you'll be asked for random characters, that's all the more reason to go with a strong complex string. Either password or memorable info. I don't think it is good practice to use actual answers for security questions. Not least because others may know this information and security details will be then have to be shared between sites as there is so much overlap between questions.In most cases, I get asked for answers to memorable info type questions in full (sometimes over the phone), so I use random phrases rather than a complex string.0 -
Yes, you are correct it is Keepass XCmasonic said:
Keepass XC?Eyeful said:flopsy1973 said:
Will from what I read, the experts do not recommend this. They say it is better to use a dedicated PWM.I have mine saved on Google password manager on my account is this not safe enough ?
Examples are:
Bitwarden (free)
Password XC (free)
1Password (paid)0 -
I use 1Password its really good but it does costLow Carb High Fat is the way forward I lost 80 lbs
Since first using Martins I have saved thousands0
Confirm your email address to Create Threads and Reply
Categories
- All Categories
- 352.1K Banking & Borrowing
- 253.6K Reduce Debt & Boost Income
- 454.2K Spending & Discounts
- 245.2K Work, Benefits & Business
- 600.8K Mortgages, Homes & Bills
- 177.5K Life & Family
- 259K Travel & Transport
- 1.5M Hobbies & Leisure
- 16K Discuss & Feedback
- 37.7K Read-Only Boards