Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 months agoPassword reuse is rampant: nearly half of observed user logins are compromisedblog.cloudflare.comexternal-linkmessage-square13linkfedilinkarrow-up131arrow-down10
arrow-up131arrow-down1external-linkPassword reuse is rampant: nearly half of observed user logins are compromisedblog.cloudflare.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 months agomessage-square13linkfedilink
minus-squareMohamed@lemmy.calinkfedilinkEnglisharrow-up2·10 months agoYes and no, in my opinion. Attackers can keep a list of all compromised passwords, and try it even for accoints that may not be associated. This is a much smaller search space than to go through every possible password of length <= 32 (for example).
Yes and no, in my opinion. Attackers can keep a list of all compromised passwords, and try it even for accoints that may not be associated. This is a much smaller search space than to go through every possible password of length <= 32 (for example).