Hasherm0n

joined 1 year ago
[–] Hasherm0n@lemmy.world 18 points 1 week ago

You are correct.

For anyone else unaware, the schtick of the account was they'd always rate dogs with ratings of x/10 with x always being greater than 10. It was pretty funny how often people would get upset over this.

[–] Hasherm0n@lemmy.world 9 points 1 week ago* (last edited 1 week ago)

What you want is NIST 800-63b https://pages.nist.gov/800-63-3/sp800-63b.html#memsecret

Specifically sections 5.1.1.1 and 5.1.1.2.

Excerpt from 5.1.1.2 pertaining to complexity and rotation requirements:

Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

Appendix A of the document contains their reasoning for changing from the previous common wisdom.

The tl;dr of their changes boil down to length is more important than any other factor when it comes to password security.

Edit to add:

In my personal opinion, organizations should be trying to move away from passwords as much as possible. If your IT team seems to think this system is so important that they need to rotate passwords every month, they should probably be transitioning to hardware security tokens, passkeys, or worst case, password with non-sms MFA.

Now I know nothing about the actual circumstances and I know there are plenty of reasons why that may not be possible in this specific case, but I'd feel remiss if I didn't mention it.

[–] Hasherm0n@lemmy.world 2 points 1 week ago

This is what I grew up calling it was well.

[–] Hasherm0n@lemmy.world 28 points 1 week ago (2 children)

Any organization still doing this is a decade behind best practices. NIST published new recommendations years ago that specified getting rid of the practice of regular forced password resets specifically because they encourage bad practices that make passwords weaker.

Of course it doesn't help that there are some industry compliance standards that have refused to update their requirements, but I don't know of any that would require monthly password changes.

[–] Hasherm0n@lemmy.world 5 points 2 weeks ago

They actually have a fairly comprehensive training program setup through their "University." They also mix in foreign contractors, usually from China.

[–] Hasherm0n@lemmy.world 1 points 2 weeks ago

My dad cracked three ribs while surfing in his 20s. He caught a wave much larger than normal, fell off his board near the top and landed flat on his back.

[–] Hasherm0n@lemmy.world 7 points 2 weeks ago

My sister actually gave my daughter this book when she was young. I thought it was good stuff.

https://www.akpress.org/aisforactivist.html

[–] Hasherm0n@lemmy.world 18 points 3 weeks ago (2 children)

Real answer for anyone curious, he's using one of these.

https://en.m.wikipedia.org/wiki/Strigil

[–] Hasherm0n@lemmy.world 2 points 3 weeks ago

I almost did before the outage. Their pay was pretty low compared to similar positions at other companies though.

[–] Hasherm0n@lemmy.world 14 points 3 weeks ago

This is something I worry a great deal about for my kid.

[–] Hasherm0n@lemmy.world 6 points 1 month ago

They're about raising the sarcophagus. Those things can be heavy.

[–] Hasherm0n@lemmy.world 8 points 1 month ago

One of my favorite T-shirts. https://www.teepublic.com/t-shirt/23763923-utc-or-gtfo

(I am not affiliated in any way with this shop)

 

Tritip, ribs, roasted corn, garlic bread. Didn't get as many pics as I had planned to, too busy cooking 😁.

view more: next ›