this post was submitted on 17 May 2025
787 points (96.0% liked)

Mildly Infuriating

39640 readers
489 users here now

Home to all things "Mildly Infuriating" Not infuriating, not enraging. Mildly Infuriating. All posts should reflect that.

I want my day mildly ruined, not completely ruined. Please remember to refrain from reposting old content. If you post a post from reddit it is good practice to include a link and credit the OP. I'm not about stealing content!

It's just good to get something in this website for casual viewing whilst refreshing original content is added overtime.


Rules:

1. Be Respectful


Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

...


2. No Illegal Content


Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means: -No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

...


3. No Spam


Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

...


4. No Porn/ExplicitContent


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

...


5. No Enciting Harassment,Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

...


6. NSFW should be behind NSFW tags.


-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

...


7. Content should match the theme of this community.


-Content should be Mildly infuriating.

-The Community !actuallyinfuriating has been born so that's where you should post the big stuff.

...


8. Reposting of Reddit content is permitted, try to credit the OC.


-Please consider crediting the OC when reposting content. A name of the user or a link to the original post is sufficient.

...

...


Also check out:

Partnered Communities:

1.Lemmy Review

2.Lemmy Be Wholesome

3.Lemmy Shitpost

4.No Stupid Questions

5.You Should Know

6.Credible Defense


Reach out to LillianVS for inclusion on the sidebar.

All communities included on the sidebar are to be made in compliance with the instance rules.

founded 2 years ago
MODERATORS
 

In password security, the longer the better. With a password manager, using more than 24 characters is simple. Unless, of course, the secure password is not accepted due to its length. (In this case, through STOVE.)

Possibly indicating cleartext storage of a limited field (which is an absolute no-go), or suboptimal or lacking security practices.

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 5 points 1 day ago

At least they tell you. I signed up with websites that just cut the password after the 12th character. No way of signing in with the password again (not without trying a couple of times, at least)

[–] [email protected] 4 points 1 day ago

when you varchar(24) and forget about the hash

[–] [email protected] 3 points 1 day ago (1 children)

I like it that the site says the max length....this is not common. I wish it was.

[–] [email protected] 4 points 15 hours ago* (last edited 15 hours ago)

The problem is a password hash is a fixed length regardless of the password, so if this is implemented correctly there is no need for a maximum password length. These things raise my security flag because it makes me think they are storing the password in plain text instead of doing proper practice and storing the hash only.

[–] [email protected] 3 points 1 day ago (1 children)

You've got to stop all those who put: abcdefghijklmnopqrstuvwxyz

That's my password for most things, any hackers die of RSI before they get in.

[–] [email protected] 1 points 15 hours ago* (last edited 15 hours ago)

It'll be caught by a dictionary attack. at least do something to break up their sequential order.

[–] [email protected] 10 points 1 day ago (1 children)

One of the accounts that I have to use at my job is like this but much much worse. It only accepts letters and numbers, no capitalization, no symbols and can only be 8 digits long maximum. It's like they want to account to be easy to compromise.

[–] [email protected] 5 points 1 day ago

That sounds like the limitations of an ancient mainframe system. If so, then someone trying to brute force their way in would be more likely to crash the system instead.

[–] [email protected] 13 points 1 day ago

If I have to create a password Ill need to remember and don't have access to my password manager for whatever reason I have a long phrase that's my go to but I have a system about adding numbers and characters to it based on the context of the log in. Sites with character limits really fuck that up.

[–] [email protected] -5 points 1 day ago (3 children)

What's the point? no one is brute forcing a 12-15 password if the login system has ANY login attempt protection anyway.

This seems like one of the extreme overkill things...

[–] [email protected] 1 points 1 day ago

That doesn't help if someone got a list of their hashes somehow. Then an attacker can use their own system to crack them.

And that's if they aren't just storing the passwords as clear text to begin with, which length limitations are often a sign of.

[–] [email protected] 1 points 1 day ago

Such a small max length is a good indicator they aren't handling passwords correctly. A modern website should be able to send and hash kilobytes of text without the user seeing a significant delay. Having a max size like this sounds like they are storing the password as text instead of a hash.

Or some dumb project manager said passwords longer than 24 characters look bad in the UI and wanted the limit.

[–] [email protected] 2 points 1 day ago

Do you check on login attempt protection behavior before creating accounts, and then choose your password length accordingly - longer or shorter?

[–] [email protected] 3 points 1 day ago

Being regected for being too long. What a conundrum.

[–] [email protected] 21 points 1 day ago (2 children)

i once used 20 for a bank. the website havent told me it was too long just clipped off 2 and accepted the rest. not even the banking support was able to help me. took me a few days to solve this by accident.

[–] [email protected] 5 points 1 day ago

This shit always pisses me off. I've encountered it in like 2-3 places over the years since I started using a password manager, and every time it's so frustrating and hard to figure out.

[–] [email protected] 3 points 1 day ago

That must have been frustrating. How many times did it lock you out from trying again?

[–] [email protected] 5 points 1 day ago (1 children)

Some people even suggest typing a longer password over a simpler one with more special characters. It's harder to brute force.

[–] [email protected] 3 points 1 day ago* (last edited 1 day ago) (2 children)

I thought the use vocabulary lookup tables effectively nullifies the entropy benefits, if everyone started using phrases as password

[–] [email protected] 3 points 1 day ago* (last edited 1 day ago)

Assuming the attacker knows it's a phrase: The english language alone apparently has some 800.000 words. 800.000^6 = 2*10^35 combinations in a dictionary attack. That's comparable to 18 random ASCII characters. We might also be using a different language, or a combination of languages, or we might deliberately misspell words.

A long string of random characters will give you more combinations per password length, but there are some passwords you just need to be able to memorize, and I'd say that's more likely with the 6 words.

[–] [email protected] 6 points 1 day ago (1 children)

Obligatory xkcd.

I don't know enough to say how accurate the numbers are, but the sentiment stands - if it's a password you're memorizing, longer password will probably be better.

[–] [email protected] 2 points 1 day ago

That's not even the case though. Using a memorized passphrase that can be broken down into individual words is susceptible to dictionary attacks provided you know what the length of the password is. You can algorithmically sort away swathes of the dictionary based on how many likely word combinations exist before searching unusual word combinations. The thing is, passwords suck. It doesn't matter how long the password is, if someone wants in, they'll crack the password or steal it via some other means. Instead of relying on a strong password, you need to be relying on additional proof factors for sign in. Proper MFA with actual secure implementation is far more secure than any password scheme. And additionally, hardware key authentication is even more secure. If you are signing into an account and storing important data there, you do not want to rely on passwords to keep that data secure.

The reason for the character limit on passwords is often to prevent malicious attacks via data dumping in the password dialogue box. Longer numbers take more CPU cycles to properly salt and encrypt. Malicious actors may dump as many characters in a password system as they wish if they wanted to take down a service or at least hurt performance.

Additionally, even if you just used lowercase letters, an 18 character password would take 12 RTX 5090s approximately 284 thousand years to crack according to the recent Hive Systems report.

24 characters is more than enough to be secure as far as passwords alone go. Just know that, nobody is out here brute forcing passwords at any length these days, there are infinite more clever ways of hacking accounts than that.

[–] [email protected] 6 points 1 day ago

This seems to be very common still

[–] [email protected] 14 points 1 day ago

I don't have it in me

load more comments
view more: next ›