Case (
case) wrote in
fandomsecrets2014-10-13 07:03 pm
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
![[community profile]](https://www.dreamwidth.org/img/silk/identity/community.png)
[ SECRET POST #2841 ]
⌈ Secret Post #2841 ⌋
Warning: Some secrets are NOT worksafe and may contain SPOILERS.
01.

__________________________________________________
02.

__________________________________________________
03.

__________________________________________________
04.

__________________________________________________
05.

__________________________________________________
06.

__________________________________________________
07.

__________________________________________________
08.

__________________________________________________
09.

Notes:
Secrets Left to Post: 02 pages, 039 secrets from Secret Submission Post #406.
Secrets Not Posted: [ 1 - broken links ], [ 0 - not!secrets ], [ 0 - not!fandom ], [ 0 - too big ], [ 0 - repeat ].
Current Secret Submissions Post: here.
Suggestions, comments, and concerns should go here.
no subject
no subject
(Anonymous) 2014-10-13 11:14 pm (UTC)(link)no subject
no subject
(Anonymous) 2014-10-13 11:19 pm (UTC)(link)no subject
no subject
no subject
(Anonymous) 2014-10-13 11:25 pm (UTC)(link)no subject
(Anonymous) 2014-10-13 11:32 pm (UTC)(link)no subject
(Anonymous) 2014-10-13 11:33 pm (UTC)(link)Might I suggest something like "Pokemon#"? Ex. "Pikachu25," "Mew151," "Chespin650" etc. That way you can memorize dex numbers at the same time and you make your password more difficult.
no subject
no subject
no subject
1. use a password safe like LastPass or KeePass
2. use random passwords for just about everything
3. use long random phrases for everything you can't put into a password safe.
If it's in a dictionary or on a wiki or BBS, it's crackable.
no subject
no subject
The biggest data breaches of the last five years have involved the publication of entire password databases through a backdoor: Adobe, Gawker, Sony PSN, Microsoft, Linkedin, etc., etc.. Once the database is made public, crackers can run parallel brute-force attacks. (Heck, AT&T just revealed that a disgruntled employee walked out the door with a bunch of information.) Front-door timeouts are meaningless as of five years ago. At this point, you shouldn't trust any site not to lose their password database.
I wouldn't really care if I lost say, my Twitter or my Tumblr. But I would care if I lost my Paypal or my email address.
Unless you reuse passwords, which most people do, including a Gawker employee who used the same password for commenting and site administration.
no subject
The fact that I give a shit about my email is why is has a decently complex and unique password, and the fact that I don't give a shit about my tumblr is why the password isn't that complex and is shared across a couple sites I also care equally as much about. That's what I meant, unless you use a password manager don't sweat having difficult passwords for shit that doesn't personally matter to you. Of course with a password manager you can just use unique random 30 character passwords for everything from your random virusy pornsites to your bank account, but password managers make me jumpy.
(no subject)
no subject
(Anonymous) 2014-10-14 11:16 am (UTC)(link)Given the huge amount of passwords one has, I find it easier to use memorable passwords, but make certain substitutions to make them safe.
no subject
If you want memorable, you're better off going long with nonsense phrases that have no meaning except to yourself and have not appeared in print or on wikipedia. (The "correct horse battery staple" method.) Have your music player spit out four random song titles and pick a word from each "mothra lust mirror coffee," or scan your bookshelves and pick four words from different books "india effect stones goblin." Adding two characters gives you more bang for your buck than *randomly* (with dice) substituting one. Non-random l33t substitutions don't help much at all.
(no subject)
(Anonymous) - 2014-10-14 16:55 (UTC) - Expand(no subject)
(no subject)
(Anonymous) - 2014-10-14 17:48 (UTC) - Expand(no subject)
(no subject)
(Anonymous) - 2014-10-16 18:37 (UTC) - Expandno subject
no subject
no subject
(Anonymous) 2014-10-13 11:37 pm (UTC)(link)no subject
* E3M8Dis is only 7 characters, lol
no subject
no subject
(Anonymous) 2014-10-13 11:53 pm (UTC)(link)Now that you've posted this, someone could start attempting a brute force crack of every known F!Ser's passwords using Pokémon names. They might get to you pretty quickly.
Now, that doesn't mean it will happen. If you're altering the spellings slightly, the difficulty goes up a lot. And your data may not be worth the effort.
no subject
(Anonymous) 2014-10-14 12:57 am (UTC)(link)no subject