this post was submitted on 12 Oct 2025
34 points (94.7% liked)
technology
24040 readers
415 users here now
On the road to fully automated luxury gay space communism.
Spreading Linux propaganda since 2020
- Ways to run Microsoft/Adobe and more on Linux
- The Ultimate FOSS Guide For Android
- Great libre software on Windows
- Hey you, the lib still using Chrome. Read this post!
Rules:
- 1. Obviously abide by the sitewide code of conduct. Bigotry will be met with an immediate ban
- 2. This community is about technology. Offtopic is permitted as long as it is kept in the comment sections
- 3. Although this is not /c/libre, FOSS related posting is tolerated, and even welcome in the case of effort posts
- 4. We believe technology should be liberating. As such, avoid promoting proprietary and/or bourgeois technology
- 5. Explanatory posts to correct the potential mistakes a comrade made in a post of their own are allowed, as long as they remain respectful
- 6. No crypto (Bitcoin, NFT, etc.) speculation, unless it is purely informative and not too cringe
- 7. Absolutely no tech bro shit. If you have a good opinion of Silicon Valley billionaires please manifest yourself so we can ban you.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
If it's three words together, they can't really verify one word by itself. That's why it's secure. They would have to test all combinations of three words which would take forever. The reason dictionary attacks work is because people use one word (password), a simple modification of a word (password1!), or a simple common phrase (openssesame1!). The technique is just hoping someone was being ignorant or negligent. But you're right, they would have to crack all three words in sequence, which means testing all combinations of three words. That's hard to do.
This is why social engineering is much more important. To even get close to cracking all three words they would have to get to know you, assuming you're using something related to yourself like a relative's name, your favorite movie, an inside joke between friends. A targeted attack against you will probably start with social engineering rather than brute forcing your passwords. A random attack is like people who walk down the street looking for an unlocked car door. They're just trying to find someone who isn't secure, not you specifically, and therefore probably wouldn't start with getting to know you.
You want your dictionary to be as small as possible. You can scrape Oxford to a text file and use that, but you're wasting so much time on thousands of words that are unlikely to be relevant. So rather than just using random words they use common words, phrases, and variations of those in their dictionaries. An actual dictionary probably wouldn't contain correct, horse, battery, or staple. It's more likely to be password, password1, password2, etc and then the other common stuff people use for passwords. If you're a targeting someone specific, you would make a custom dictionary specific to their life.
If you pick 3 randon words out of 40000 that's less entropy than a 8 random character password with only letters and numbers.
Good info! And that's exactly what I meant - a word is weak, but several randomized words together is pretty crazy strong. Slightly less than random letters, but much easier to type in memorize when the situation calls for it.