I’m aware of what constitutes a decent password, but typing in 15-30 random characters each time I lock my computer screen is starting to get a bit taxing.

How secure does my user password really need to be and what are the threats to it? Does the same apply to a root-enabled user as a “regular” user when it comes to password security?

For context, my threat model doesn’t need to account for real people breaking in and accessing my computer, the damage would be very contained.

Bonus question - what are the risks of having a weak password on a root user on a spare laptop on the same network as my main device that is used exclusively for web browsing? Thanks.

  • astrsk@fedia.io
    link
    fedilink
    arrow-up
    2
    ·
    3 months ago

    One can also mix in numbers and symbols and capital letters with their passphrase / sentence. Throw in a comma, exclamation mark, replace an l with 1, o with 0, etc. of course it’s diminishing returns with a sufficiently long passphrase but it can help against dictionary type attacks by adding additional mutations / steps to the cracking.

    • IphtashuFitz@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 months ago

      Years ago I worked at a company where they based server root/admin passwords on song lyrics. The person who came up with it clearly liked classic rock. I still remember at least one of them:

      4ThoseAboutToRockWeSaluteYou!

      • astrsk@fedia.io
        link
        fedilink
        arrow-up
        2
        ·
        3 months ago

        Lyrics are a pretty good base. Especially in passphrase style with spaces if supported, along with punctuation and capitals/numbers. What sucks is when an account system can’t support a long password. That’s the most frustrating requirement for any service and the greatest vulnerability of all the common restrictions.