• Nelots@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        ·
        edit-2
        1 year ago

        I got to step 20, where my password suddenly caught on fire and Paul died.

        My day is ruined.

    • Dubious_Fart@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 year ago

      It was never best practices for anyone who had common sense.

      It just forced people to make insecure, easy to remember passwords, cause they were gonna be changed in again soon so why make it complicated and hard to remember.

        • pezhore@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Psh… That’s amateur, I just keep incrementing the number at the end ‘password1’, ‘password2’, etc. Gotta fool the password reuse counter!

      • poop@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Encourages users to just add a rotating number or other not too secure thing to their password. I know that’s what I did when I worked somewhere with that dumbfuck policy.

        • fadedmaster@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          Yep. My least secure password is the one I use at work because I’m restricted to 9-12 characters, can’t be sequential forwards or backwards including keys next to each other (abc, 123, qwerty), can’t begin with a number, must contain at least three numbers, must be at least four characters different from your last twelve passwords, and must be changed every 90 days. Oh and it can’t include your first or last name.

          Most of my coworkers just use a family members name and then change a few numbers at the end and keep a post it note at their desk with the numbers so they don’t forget it.

      • vzq@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        1 year ago

        NIST removed password expiration from their recommendations in 2020. Instead they recommend only forcing password changes when compromise is suspected.

        The main argument is that they do not make users or systems demonstrably safer and encourage bad password habits.

      • Reddit_Is_Trash@reddthat.com
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 year ago

        I would imagine most users change their password by only 1 character, and maybe even in sequential order.

        When time comes to change the password, it becomes password1234 instead of password123. Or password234. Something easy to remember, most users don’t care about best security practices, and changing to a similar password is very convenient. Especially if it’s “only” for work stuff

      • pkulak@beehaw.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        The original idea was that you would take how long it took to brute-force a password, then require the password be changed before that. But we have better hashing now, like bcrypt, where you can tune it so that brute forcing anything would take 100s of years.