this post was submitted on 07 Dec 2025
152 points (98.1% liked)

World News

53676 readers
1978 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News !news@lemmy.world

Politics !politics@lemmy.world

World Politics !globalpolitics@lemmy.world


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 2 years ago
MODERATORS
 

It is a hacker’s dream. Even in the face of repeated warnings to protect online accounts, a new study reveals that “admin” is the most commonly used password in the UK.

The second most popular, “123456”, is also unlikely to keep hackers at bay.

It’s not just a problem here – Australians, Americans and Germans also use “admin” more than any other password when accessing websites, apps and logging in to their computers. Around the world, “123456” emerges as the most popular.

all 32 comments
sorted by: hot top controversial new old
[–] Dagnet@lemmy.world 44 points 2 months ago (1 children)

Luckily for me my password is ******

Edit: weird lemmy automatically replaced my password with '*'

[–] lemmyng@piefed.ca 49 points 2 months ago (3 children)
[–] Dagnet@lemmy.world 26 points 2 months ago

It really works! I only see ******* !

[–] prole@lemmy.blahaj.zone 15 points 2 months ago
[–] JargonWagon@lemmy.world 5 points 2 months ago
[–] 7U5K3N@lemmy.dbzer0.com 30 points 2 months ago (2 children)

The second most popular, “123456”, is also unlikely to keep hackers at bay.

That's what I use on my luggage

[–] frongt@lemmy.zip 18 points 2 months ago (1 children)

You should enable MFA on your luggage

[–] 7U5K3N@lemmy.dbzer0.com 3 points 2 months ago (1 children)

You know you say that more than likely in jest....

But that's honestly not a terrible idea.

[–] frongt@lemmy.zip 7 points 2 months ago (2 children)

No, it is a terrible idea. The lock is not the weak point on the luggage, it's the zipper.

[–] MonkeMischief@lemmy.today 3 points 2 months ago

Overall I think the weakest part of luggage is its unusually high liklihood of attack by state adversaries. :p

[–] 7U5K3N@lemmy.dbzer0.com 2 points 2 months ago

That's very true! That zipper makes a great case for hard luggage that clamps closed.

Pelican I think makes really good luggage but with pelican comes the cost.

[–] Railcar8095@lemmy.world 8 points 2 months ago (1 children)
[–] 7U5K3N@lemmy.dbzer0.com 13 points 2 months ago (1 children)

12345 was made popular by a documentary several years ago. So I updated my luggage.

/s

It's a reference to Spaceballs if you were out of the loop.

[–] Railcar8095@lemmy.world 9 points 2 months ago

I was out of the loop, thanks for the clarification.

[–] markz@suppo.fi 23 points 2 months ago* (last edited 2 months ago) (3 children)

Don't use shit passwords. Don't reuse passwords. Get a password manager. Use 2fa.

[–] Danquebec@sh.itjust.works 1 points 2 months ago* (last edited 2 months ago)

I reuse passwords on sites where I don't care if my account gets breached.

On sites where it matters, I store them in a password manager.

On sites where money is managed, I keep the passwords only in my mind.

[–] HC4L@lemmy.world 1 points 2 months ago (1 children)

Online or offline password manager?

[–] Fizz@lemmy.nz 2 points 2 months ago

Either or as long as theyre stored encrypted and decrypted on device.

[–] shalafi@lemmy.world 19 points 2 months ago (1 children)

Picked up a keyboard at the thrift with a pink sticky note on the bottom:

user:admin

pass:password

Yes, someone had to write that down.

[–] goferking0@lemmy.sdf.org 4 points 2 months ago

I'm their defense sometimes you have to be reminded that something that terrible was used

[–] Kyrgizion@lemmy.world 12 points 2 months ago

I've "hacked" web apps by logging in with "user - password" or something equally inane.

[–] kaitco@lemmy.world 9 points 2 months ago

But, my long-time sole password of TrustNo1 should be good right??

[–] FordBeeblebrox@lemmy.world 4 points 2 months ago

Correct Horse Battery Staple

[–] realitista@lemmus.org 3 points 2 months ago

I only came for the list of most popular passwords. I am disappointed.

[–] Jimbabwe@lemmy.world -4 points 2 months ago (1 children)

Invent your own hashing algorithm. It’s easy, fool-proof, secure, and reusable without compromising security.

Here’s a few examples: ebay.com password is moc.y4b3-saltyboi69 lemmy.world password is dlr0w.ymm3l-saltyboi69

(These aren’t real btw)

[–] Jumuta@sh.itjust.works 2 points 2 months ago (2 children)

people writing password crackers are smarter than that dude

[–] Zaktor@sopuli.xyz 4 points 2 months ago (1 children)

Most compromised passwords are used by script kiddies in mass attacks, not targeted attacks by elite hacking squads. If a password fails verbatim, they just move on to the next compromised account of millions, not develop pattern recognition software to try to figure out replacement candidates for each website.

[–] Jumuta@sh.itjust.works 1 points 2 months ago* (last edited 2 months ago)

Association attacks exist in the wild.

Let's say that this is their ebay account. In that case the reward for unlocking each account is very high, so attackers (even in mass attacks) have incentive to put in more work as long as the work cost per account hacked is less than the average reward and there is a net profit.

I assume in this day and age it's probably also viable to use LLMs for password guessing, as long as it's for a high value account. That unlocks a whole another can of worms and if it was me I'd never use low entropy passwords like "moc.y4b3-saltyboi69"

Perhaps this kind of password is viable if it's for an online service that implements rate limiting, but you also have to consider the case that a site gets hacked and their encrypted database (encrypted by each user's password) makes it onto the web. This has happened a lot recently and makes it ridiculously easy for people to throw their GPUs at the task.

[–] Jimbabwe@lemmy.world 0 points 2 months ago

You sound pretty unqualified to judge smartness.