Comments by "Perhaps" (@NoEgg4u) on "IBM Technology" channel.

  1. 60
  2. 12
  3. 3
  4. 3
  5. 1
  6. @9:02 "Also, check it (your password) against a database, like we've talked about before; these known passwords; known, vulnerable passwords, and make sure it (your passwords) doesn't match any of those". There are sites where you can plug in your password, to conduct such a test. I don't think that you should use such a site, because you are giving them your password. Find a site where you can download such a database of passwords, and then search that database of passwords, yourself, on your own computer, to see if your password is in there. One other recommendation: Do not use browser extensions. They can monitor 100% of your browser activity, including every password that you use to login to any sties. Browser extensions make using the internet convenient. But with convenience comes compromised security. The more you have of one, the less you have of the other. Most browser extensions are safe. But bad actors know that people love browser extensions, and so a small percentage of browser extensions contain malware -- and even some very popular browser extensions have been found to be doing nefarious deeds. As our host recommended, use a password manager. When downloading one, triple check that you are getting it from a legitimate source. The last thing you want to do is download a password manager from a bad actor. They would love nothing more than for you to create your passwords with their app, and then their app sends them all of your passwords. So be 100% sure that you are using a genuine password manager from a legitimate source. And never use a password in two different places (never re-use a password). Every site that you login to should have a separate, unique, strong password (and that is where a password manager shines, making doing so less of a chore). And make a copy of your password manager's database, on a separate storage device.
    1
  7. @2:10 "...and they all synchronize, up to a cloud (someone else's computer)". Isn't it taboo to let anyone else have your private key? @8:35 "...they may be able to crack those, and come out, with what is the actual password, if given enough time". If your password manager creates a 15+ character, cryptic password, then the amount of time would be half of forever. And with a password manager, you can use a 20+ character, cryptic password. You would have a better chance of winning the lottery, three times in a row, before being able to crack a 20 character password, such as this: ayba]{(<[%+H JS616@A And, the attacker would need to know which hashing algorithm was used, and would also need to know if multiple iterations of hashes were used, and if salt or pepper was used to further complicate generating the hash. If you lose your computer, it is somewhat simple to change a user's password, making it somewhat simple for whoever has your computer to login to your computer. Now that they are logged in as you, your passkeys are at their disposal. And if you ever bring your computer in for a repair, they can clone your drive, plug in the cloned drive to their own computer, login as you, and they have your passkeys. With a good password manager, then as long as you use a strong master password, and you also have the password manager create virtually unbreakable passwords, then you should be fine. And some password managers will not paste in your password if the site is a fake. A user might not detect a similar (but different) URL. But a password manager will detect it as a different site. Passkeys do not do that. Lastly, password managers allow you to easily make copies of your encrypted password database. You can store those copies anywhere, even on your arch nemesis's computer.
    1